WO2024041436A1 - Service request processing method and apparatus, and electronic device and storage medium - Google Patents

Service request processing method and apparatus, and electronic device and storage medium Download PDF

Info

Publication number
WO2024041436A1
WO2024041436A1 PCT/CN2023/113405 CN2023113405W WO2024041436A1 WO 2024041436 A1 WO2024041436 A1 WO 2024041436A1 CN 2023113405 W CN2023113405 W CN 2023113405W WO 2024041436 A1 WO2024041436 A1 WO 2024041436A1
Authority
WO
WIPO (PCT)
Prior art keywords
business
interception
account
target account
target
Prior art date
Application number
PCT/CN2023/113405
Other languages
French (fr)
Chinese (zh)
Inventor
唐鑫琦
郭嘉
李圆
张备
王博仑
徐行
穆琳
林元
Original Assignee
抖音视界有限公司
脸萌有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 抖音视界有限公司, 脸萌有限公司 filed Critical 抖音视界有限公司
Publication of WO2024041436A1 publication Critical patent/WO2024041436A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Definitions

  • the embodiments of the present disclosure relate to the field of Internet technology, and in particular, to a service request processing method, device, electronic device, and storage medium.
  • the platform usually identifies illegal requests based on manual or fixed rule review, and then intercepts illegal accounts that send illegal requests to prevent such illegal accounts from continuing to send illegal requests. .
  • Embodiments of the present disclosure provide a service request processing method, device, electronic device, and storage medium.
  • embodiments of the present disclosure provide a service request processing method, including:
  • Obtain a target account which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes; determine the corresponding key business node according to the target account, and the key business node is When performing access interception on illegal requests initiated by the target account, the service node with the best interception effect among the at least two service nodes shall perform access interception on the service request sent by the target account based on the key business node.
  • an embodiment of the present disclosure provides a service request processing device, including:
  • An acquisition module configured to acquire a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
  • Determination module configured to determine the corresponding key business node according to the target account.
  • the interception effect is the best among the at least two business nodes. business nodes;
  • the interception module is used to access and intercept business requests sent by the target account based on the key business nodes.
  • an electronic device including:
  • a processor and a memory communicatively connected to the processor
  • the memory stores computer execution instructions
  • the processor executes computer execution instructions stored in the memory to implement the service request processing method described in the first aspect and various possible designs of the first aspect.
  • embodiments of the present disclosure provide a computer-readable storage medium.
  • Computer-executable instructions are stored in the computer-readable storage medium.
  • the processor executes the computer-executable instructions, the above first aspect and the first aspect are implemented.
  • Various possible designs for the described business request processing methods are possible.
  • embodiments of the present disclosure provide a computer program product, including a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
  • embodiments of the present disclosure provide a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
  • the business request processing method, device, electronic device and storage medium provided by the embodiments of the present disclosure obtain the target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes. ; According to the target account, determine the corresponding key business node.
  • the key business node is the business node with the best interception effect among the at least two business nodes when access interception is performed for illegal requests initiated by the target account; Based on the key business node, access interception is performed on the business request sent by the target account. Because before intercepting illegal requests initiated by the target account, the key business nodes in the target business with better interception effects are first evaluated, and then access interception of illegal requests initiated by the target account is performed on the key business nodes.
  • Figure 1 is an application scenario diagram of the business request processing method provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart 1 of a service request processing method provided by an embodiment of the present disclosure
  • FIG. 3 is a flow chart of specific implementation steps of step S102 in the embodiment shown in Figure 2;
  • Figure 4 is a schematic diagram of access interception for business nodes provided by an embodiment of the present disclosure.
  • FIG. 5 is a flow chart of specific implementation steps of step S1022 in the embodiment shown in Figure 3;
  • FIG. 6 is a flow chart of specific implementation steps of step S103 in the embodiment shown in Figure 2;
  • Figure 7 is a schematic flowchart 2 of a service request processing method provided by an embodiment of the present disclosure.
  • Figure 8 is a schematic diagram of a behavioral feature provided by an embodiment of the present disclosure.
  • FIG. 9 is a flow chart of specific implementation steps of step S207 in the embodiment shown in Figure 7;
  • Figure 10 is a structural block diagram of a service request processing device provided by an embodiment of the present disclosure.
  • Figure 11 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure.
  • FIG. 12 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present disclosure.
  • FIG 1 is an application scenario diagram of the business request processing method provided by the embodiment of the present disclosure.
  • the business request processing method provided by the embodiment of the present disclosure can be applied to the application scenarios of security protection and risk control management of the Internet platform. More specifically, places, such as application scenarios for security protection on social platforms.
  • the method provided by the embodiment of the present disclosure can be applied to the risk control server.
  • the risk control server is connected to the platform server, and the external request sent by the terminal device First, enter the risk control server, and the risk control server will process it, identify and intercept illegal requests, and then send normal legal requests to the platform server, and the platform server will respond to them and generate user messages, release information, etc. Platform content.
  • illegal behaviors such as cyber attacks, information theft, extortion and fraud using Internet technology are also increasing. For example, including promoting illegal websites on Internet social platforms, publishing fraudulent information, etc., thereby obtaining illegal income.
  • the above-mentioned illegal behaviors are usually achieved by using Internet technology to automatically send business requests to the platform server, thereby registering accounts on Internet social platforms in batches, and disguising themselves as real users to publish illegal content.
  • social platforms usually identify business requests for illegal business purposes based on rules, and then intercept illegal accounts that send illegal requests at fixed business nodes to prevent such illegal accounts from continuing to send illegal requests.
  • the interception method based on fixed nodes can be easily identified by attackers who send illegal requests and bypass the interception by modifying the sending parameters, resulting in poor interception effects and low interception accuracy.
  • FIG. 2 is a schematic flowchart 1 of a service request processing method provided by an embodiment of the present disclosure. The method in this embodiment can be applied in the server.
  • the service request processing method includes:
  • Step S101 Obtain a target account.
  • the target account is an account with the risk of initiating illegal requests to the target business.
  • the target business has at least two business nodes.
  • the target account is a subset of all accounts registered on the server, more specifically, the illegal account in the above application scenario introduction.
  • the target account in this embodiment is a batch of accounts registered by an attacker (illegal gang). Registered, aggregated accounts with similar characteristics in one or more dimensions.
  • the target account may refer to an account that has a record of sending illegal requests, or has the possibility of sending illegal requests based on assessment, where an illegal request is a business request containing illegal content sent to the server, and the illegal content is, for example, fraud information. , illegal website information, etc. After the illegal request is responded to by the server, the illegal information will be displayed on the corresponding network platform.
  • the target account can be obtained through account data preset in the server, or can be determined by detecting business requests sent by different accounts in real time and evaluating them. There is no specific limitation here.
  • the illegal request initiated by the target account corresponds to the target business.
  • the target business is, for example, publishing status on social platforms, publishing comments, and other services.
  • the target business has at least two business nodes.
  • the target business is publishing status on a social platform.
  • the business nodes corresponding to the target business include: "Register Account”, “Login Account”, “Follow Friends”, and "Publishing Status".
  • the target account needs to report to various industries respectively.
  • the service node sends a service request, thereby ultimately achieving the purpose of sending an illegal request to the target business (posting a status containing illegal content on the social platform).
  • Step S102 Determine the corresponding key business node according to the target account.
  • the key business node is the business node with the best interception effect among at least two business nodes when access interception is performed on illegal requests initiated by the target account.
  • the corresponding key business node is determined, that is, the business node with the best interception effect when intercepting illegal requests initiated by the target account.
  • the business node with the best interception effect for example, the business node with the highest interception rate for illegal requests; for example, the business node with the least consumption of computing resources during the interception process; and then For example, the business node with the longest effective interception time for intercepting illegal requests.
  • the characteristics of the target account are the number of target accounts, and the corresponding key business nodes are determined based on the number of target accounts; for another example, the target The characteristics of the account are the historical interception records corresponding to the target account; by obtaining the historical interception records of the target account, the effect of interception on each business node for the target account is judged, thereby determining the key business nodes.
  • step S102 include:
  • Step S1021 Obtain the first service request sent by the target account.
  • Step S1022 According to the first service request, determine the interception revenue corresponding to each business node.
  • the interception revenue represents the effective interception time of intercepting the attacker belonging to the target account at the corresponding business node based on the unit's computing resources.
  • the service request sent by the target account is detected.
  • the first service request sent by the target account is detected, the first service request is intercepted at different service nodes, and the interception effect is evaluated, that is, Interception earnings.
  • the attacker who sent the illegal request bypassed the access interception at business node A by changing parameters; after interception at business node B, After 8 hours, the attacker who sent the illegal request bypassed the access interception at the B business node by changing the parameters. That is, the effective interception time at the B business node is longer and the interception income is higher.
  • Figure 4 is a schematic diagram of access interception for business nodes provided by an embodiment of the present disclosure.
  • the process of determining the interception revenue corresponding to each business node is introduced below in conjunction with Figure 4.
  • the target business is in the "social network”"Platform Release Status" business.
  • the target business includes "Login Node”, “Status Editing Node", and "Status Display Node”.
  • each business node (“Login Node”, “Status Display Node") needs to be sent to each business node ("Login Node", "Status Display Node”).
  • “Status Editing Node”, “Status Display Node”) sends the first service request, where the first service request includes three sub-requests, namely the first sub-request for the "Login Node”; the second sub-request for the "Status Editing Node”Request; third subrequest for "status display node".
  • the target account includes N accounts, where N is an integer greater than 2, where the target account is divided into three account sets, namely account set A, account set B, and account set C.
  • the target account is intercepted at different business nodes, so that the target account cannot plan the target business.
  • the attacker who uses the target account to send illegal requests will change the parameters in the business request sent by adjusting and modifying the program script, such as changing the content keywords in the business request, Login information, etc., to avoid interception and achieve the purpose of triggering the target business normally (such as posting a status containing illegal information on a social platform).
  • the time cost and computing resource cost of the attacker who sends the illegal request to identify the interception rules and avoid the interception are different.
  • the attacker can directly re-register a new account through the program script to launch the attack. Therefore, the time cost and computing resource cost spent by the attacker to avoid interception are relatively low, that is, the effective interception time is short; while accessing at the "status display node” After interception, the attacker needs to send requests to multiple nodes such as "login node” and "status editing node” through the target account. At the same time, he needs to analyze the reasons and rules why illegal content cannot be displayed on social platforms in order to avoid interception. Therefore, it is necessary to It costs more computing resources and time, that is, the effective interception time is longer.
  • the above introduction is only exemplary.
  • the effective interception time of intercepting the attacker belonging to the target account at different business nodes is affected by many factors. Therefore, the actual effective interception time of each business node can be detected.
  • the interception duration is used to determine the interception revenue corresponding to each business node.
  • step S1022 includes:
  • Step S1022A Based on the preset unit computing resources, perform access interception at different business nodes for the first service request sent by the target account, and record the first time corresponding to each business node.
  • the first time is the start time of access interception. .
  • Step S1022B Detect the second service request for different service nodes sent by the target account, and record the second time corresponding to the second service request, where the second service request is a service request that bypasses access interception, and the second time is when the second service request is received The time of the second service request.
  • Step S1022C Determine the interception revenue corresponding to each service node based on the first time and the second time.
  • Step S1023 Determine key business nodes based on interception revenue.
  • computing resources include, for example, thread resources, memory resources, network resources, etc.
  • the computing resources are calculated in units, that is, computing resources of a preset size. The specifics are not limited. According to the unit computing resources, some accounts in the target account are used in different businesses.
  • the node After the node intercepts, it records the corresponding time node, that is, the first moment; then, detects the second service request sent by the target account for each service node, and obtains the moment when the second service request is received, that is, the second moment, where, The second service request is a service request that bypasses access interception.
  • the illegal information contained in the first service request is "www.xxx.cn" (for example, a fraudulent website); the server intercepts the first service request at the "status display node” and displays the illegal information "www. xxx.cn” is replaced with the string "######”; then the attacker modifies the request parameters and changes the illegal information "www.xxx.cn” to "www(/).xxx(/).cn(/ )", and generate a second service request based on the modified illegal information to avoid the server's identification of the illegal information "www.xxx.cn" in the first service request, thereby achieving the purpose of bypassing access interception.
  • the effective interception duration of access interception at the corresponding business node can be determined, thereby obtaining interception benefits. Furthermore, the business node with the greatest interception revenue is determined as the key business node.
  • the interception revenue of each business node is continuously detected, and the business node with the largest interception revenue is selected as Key business nodes, and in subsequent steps, based on the key business nodes, illegal requests initiated by the attacker are accessed and intercepted, thereby increasing the attacker's network attack cost, thereby improving the interception efficiency of illegal requests and improving computing resource utilization.
  • Step S103 Based on the key business nodes, perform access interception on the service requests sent by the target account.
  • access interception is performed on the business requests sent by the target account based on the key business nodes, so as to dynamically maximize the interception efficiency.
  • the key business node is the "Add Friend" business node in a social platform
  • the attacker can register "target accounts" in batches through program scripts, and send business requests to perform operations such as user login and likes.
  • "Add friends" cannot be performed; and when the attacker modifies the parameters and sends illegal requests again, the interception revenue of the key business nodes based on the corresponding business nodes may change accordingly, for example, it becomes the "post information" in the social platform.
  • the business node that is, the attacker can perform operations such as user login and adding friends by sending business requests, but cannot publish information.
  • dynamic access interception to the target account is achieved.
  • step S103 the specific implementation steps of step S103 include:
  • Step S1031 Determine an interception strategy based on key business nodes.
  • the interception strategy represents the preset allocation of computing resources to each business node.
  • Step S1032 According to the interception policy, intercept the service request sent by the target account at the key service node and at least one other service node.
  • the risk control server needs to process a large amount of request data in real time. There are multiple attackers sending illegal requests to the platform at the same time. Therefore, illegal The request interception strategy needs to consider the overall computing resource allocation of the risk control server to ensure the real-time processing of business requests. Specifically, after determining the key business nodes, more computing resources can be allocated to the key business nodes. For example, access interception is only performed on all target accounts at the key business nodes; at the same time, in the target business except the key business nodes, Other business nodes allocate a small amount of computing resources to intercept some of the target accounts in other business nodes, thereby forming a more complex interception strategy.
  • the interception strategy can be provided through a pre-trained processing model, that is, the target business and key business nodes are used as input, and the corresponding interception strategy is output through the pre-trained processing model.
  • the target account is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes; according to the target account, the corresponding key business node is determined, and the key business node is for When intercepting illegal requests initiated by the target account, the business node with the best interception effect is used; based on key business nodes, access interception is performed on the business requests sent by the target account. Because before intercepting illegal requests initiated by the target account, we first evaluate the key business nodes with better interception effects in the target business, and then intercept illegal requests initiated by the target account on the key business nodes, thereby improving the effectiveness of illegal requests. Interception accuracy, while forming a dynamic interception of the target account, making it more difficult for the target account to bypass interception by changing access parameters, and improving the efficiency of computing resources.
  • Figure 7 is a schematic flow chart 2 of a service request processing method provided by an embodiment of the present disclosure. Based on the embodiment shown in Figure 2, this embodiment adds the steps of determining the target account and updating the interception policy based on the complaint data.
  • Business request processing methods including:
  • Step S201 Detect daily business requests.
  • Step S202 Obtain multi-dimensional characteristics of daily business requests.
  • the risk control server that is, the execution subject of this embodiment, will perform indiscriminate processing on the business requests sent by the user to the risk control server through the terminal device. Or perform random detection to obtain business requests sent by different accounts, that is, daily business requests. Afterwards, multi-dimensional features corresponding to daily business requests are obtained.
  • multi-dimensional features include at least two of the following categories: account features, device features, behavioral features, and content features. Each feature is introduced in detail below:
  • Account characteristics that is, the characteristics of the account that sends the daily business request, such as account identification (such as account name, account avatar), account creation time, account registration information (such as age, gender, residence and other information set in the account), etc.
  • the daily business request may include the identification information of the account that sends the request, and the account characteristics can be further determined through the identification information.
  • Device characteristics that is, characteristics of the device logged in by the account that sent the daily business request, such as device identification, device model, device login time, device network address, etc.
  • the daily service request may include the identification information of the device sending the request, and the device characteristics may be further determined through the identification information.
  • Behavioral characteristics characterize the order of daily business requests sent by the same account for different business nodes, that is, the order in which business requests are sent to each business node of the target business, that is, the timing of triggering each business node. Behavioral characteristics can be jointly determined through the specific content information of multiple daily business requests.
  • Figure 8 is a schematic diagram of a behavioral feature provided by an embodiment of the present disclosure.
  • Content characteristics that is, characteristics of the content in the daily business requests sent, such as specific keywords and statements containing specific keywords, and/or behavioral content for behavioral characteristics, such as daily business requests used to trigger "add friends" Business node, the corresponding content feature is the account ID of the friend to be added.
  • Content characteristics can be determined through specific content information in daily business requests.
  • multi-dimensional features refer to the combination of at least two of the above four features. More specifically, multi-dimensional features can include multiple features of each type (account features, device features, behavioral features, content features). Subcategory, thereby obtaining more dimensional combinations. For example, multi-dimensional features can include 500-dimensional features, thereby achieving a more accurate description of business requests.
  • Step S203 Cluster accounts corresponding to daily business requests according to multi-dimensional features to obtain multiple clustered accounts.
  • a clustered account is a set of multiple accounts with the same clustering features, where the clustering feature is multi-dimensional. subset of features.
  • Step S204 Determine the target cluster account according to the number of accounts in each cluster account, and the account in the target cluster account is the target account.
  • multi-dimensional features are equivalent to the description information of daily business requests.
  • daily business requests sent by normal accounts due to differences in the ways and purposes of different users using the Internet platform, the characteristics of the daily business requests sent by them in multiple dimensions are random. Therefore, daily business requests issued by normal accounts are usually not concentrated under the same multi-dimensional characteristics.
  • illegal accounts target accounts registered by attackers using script programs, the illegal requests issued are driven by program scripts.
  • the accounts corresponding to daily business requests with the same multi-dimensional characteristics are clustered to obtain clustered accounts. Afterwards, the number of clustered accounts is evaluated. When the number of clustered accounts is greater than the preset value, it is determined that the account in the clustered account is abnormal and there is a risk of initiating illegal requests, that is, the target account.
  • the daily business requests are comprehensively judged from multiple dimensions, and based on the aggregation of multi-dimensional features of daily business requests, illegal requests generated by script programs and those generated by ordinary accounts are accurately distinguished. Send the correct business request to achieve precise positioning of the target account.
  • This method avoids the problem of being unable to accurately locate the target account due to the attacker changing the request parameters in the existing solution of judging the target account based on expert experience, and improves the detection accuracy of illegal accounts.
  • Step S205 Determine the corresponding key business node according to the target account.
  • the key business node is the business node with the best interception effect when intercepting illegal requests initiated by the target account.
  • Step S206 Obtain appeal data, which is appeal information against access interception sent by the target account.
  • Step S207 Update the target account and/or interception policy according to the complaint data, and return to step S201, where the interception policy is a policy for access interception of service requests sent by the target account.
  • the processing model that provides the interception strategy is further trained to update the target account that was previously determined to be an illegal account, and/or update the interception strategy for the target account, where, about
  • the interception strategy please refer to the relevant introduction in the embodiment shown in Figure 6, and will not be described again here.
  • step S207 include:
  • Step S2071 Cluster according to the content of the complaint data to obtain the first complaint sample and the second complaint sample.
  • the first complaint sample is the complaint information sent by the normal account
  • the second complaint sample is the risk of initiating illegal requests to the target business. account.
  • Step S2072 Update the target account and/or interception policy based on the first complaint sample and/or the second complaint sample.
  • the processing model that provides the interception strategy is trained based on the white sample to complete the automatic optimization and iteration of the interception strategy and improve the accuracy and rationality of the interception strategy.
  • step S205 is the same as the implementation of step S102 in the embodiment shown in FIG. 2 of the present disclosure, and will not be described again one by one.
  • FIG. 10 is a structural block diagram of a service request processing device provided by an embodiment of the present disclosure. For convenience of explanation, only parts related to the embodiments of the present disclosure are shown.
  • service request processing device 3 includes:
  • the acquisition module 31 is used to obtain a target account.
  • the target account is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
  • the determination module 32 is used to determine the corresponding key business node according to the target account.
  • the key business node is the business node with the best interception effect when access interception of illegal requests initiated by the target account;
  • the interception module 33 is used to access and intercept business requests sent by the target account based on key business nodes.
  • the determination module 32 is specifically configured to: obtain the first service request sent by the target account; determine the interception revenue corresponding to each service node according to the first service request, and the interception revenue representation is based on unit computing resources, The effective interception duration for intercepting the attacker belonging to the target account at the corresponding business node; determine the key business nodes based on the interception revenue.
  • the determination module 32 when determining the interception revenue corresponding to each business node according to the first business request, is specifically used to: based on the preset unit computing resources, target the first business request sent by the target account. , conduct access interception at different business nodes, and record the first moment corresponding to each business node.
  • the first moment is the start time of access interception; detect the second business request for different business nodes sent by the target account, and record the second business
  • the second moment corresponding to the request where the second service request is a service request that bypasses access interception, and the second moment is the moment when the second service request is received; according to the first moment and the second moment, determine the corresponding service node of each service node. Interception earnings.
  • the interception module 33 is specifically used to: determine an interception strategy based on key business nodes.
  • the interception strategy represents the preset total computing resource allocation in each business node; according to the interception strategy, on the key business nodes.
  • the business node and at least one other business node intercept the business request sent by the target account.
  • the acquisition module 31 is specifically configured to identify the target account based on the multi-dimensional characteristics of daily business requests.
  • the acquisition module 31 when the acquisition module 31 identifies the target account according to the multi-dimensional characteristics of the daily business request, it is specifically used to: obtain the multi-dimensional characteristics of the daily business request; according to the multi-dimensional characteristics, correspond to the daily business request.
  • Accounts are clustered to obtain multiple clustered accounts.
  • a clustered account is a set of multiple accounts with the same clustering characteristics, where the clustering characteristics are a subset of multi-dimensional characteristics; according to the accounts in each clustered account number, determine the target cluster account, and the account in the target cluster account is the target account.
  • multi-dimensional features include at least two of the following categories: account features, device features, behavior features, and content features.
  • the acquisition module 31 is also used to: obtain appeal data, which is appeal information for access interception sent by the target account; update the target account and/or interception policy according to the appeal data, wherein,
  • the interception policy is a policy for access interception of business requests sent by the target account.
  • the acquisition module 31 when updating the target account and/or interception strategy according to the complaint data, is specifically used to: perform clustering according to the content of the complaint data, and obtain the first complaint sample and the second complaint sample. , among which, the first complaint sample is the complaint information sent by the normal account, and the second complaint sample is the risk of initiating illegal requests to the target business. Account; update the target account and/or interception policy based on the first complaint sample and/or the second complaint sample.
  • the service request processing device 3 provided in this embodiment can execute the technical solution of the above method embodiment. Its implementation principles and technical effects are similar, and will not be described again in this embodiment.
  • FIG 11 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure. As shown in Figure 11, the electronic device 3 includes:
  • Processor 41 and memory 42 communicatively connected to processor 41;
  • Memory 42 stores computer execution instructions
  • the processor 41 executes the computer execution instructions stored in the memory 42 to implement the service request processing method in the embodiment shown in Figures 2 to 9.
  • processor 41 and the memory 42 are connected through the bus 43 .
  • the electronic device 900 may be a terminal device or a server.
  • terminal devices may include but are not limited to mobile phones, notebook computers, digital broadcast receivers, personal digital assistants (Personal Digital Assistant, PDA), tablet computers (Portable Android Device, PAD), portable multimedia players (Portable Media Player , PMP), mobile terminals such as vehicle-mounted terminals (such as vehicle-mounted navigation terminals), and fixed terminals such as digital televisions (Television, TV), desktop computers, etc.
  • PDA Personal Digital Assistant
  • PMP portable multimedia players
  • mobile terminals such as vehicle-mounted terminals (such as vehicle-mounted navigation terminals)
  • fixed terminals such as digital televisions (Television, TV), desktop computers, etc.
  • the electronic device shown in FIG. 12 is only an example and should not impose any limitations on the functions and scope of use of the embodiments of the present disclosure.
  • the electronic device 900 may include a processing device (such as a central processing unit, a graphics processor, etc.) 901, which may process data according to a program stored in a read-only memory (Read Only Memory, ROM) 902 or from a storage device 908
  • the program loaded into the random access memory (Random Access Memory, RAM) 903 performs various appropriate actions and processing.
  • RAM 903 various programs and data required for the operation of the electronic device 900 are also stored.
  • the processing device 901, ROM 902 and RAM 903 are connected to each other via a bus 904.
  • An input/output (I/O) interface 905 is also connected to bus 904.
  • the following devices can be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; including, for example, a Liquid Crystal Display (LCD) , an output device 907 such as a speaker, a vibrator, etc.; a storage device 908 including a magnetic tape, a hard disk, etc.; and a communication device 909.
  • the communication device 909 may allow the electronic device 900 to communicate wirelessly or wiredly with other devices to exchange data.
  • FIG. 12 illustrates electronic device 900 with various means, it should be understood that implementation or availability of all illustrated means is not required. More or fewer means may alternatively be implemented or provided.
  • embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable medium, the computer program containing program code for performing the method illustrated in the flowchart.
  • the computer program may be downloaded and installed from the network via communication device 909, or from storage device 908, or from ROM 902.
  • the processing device 901 the above-mentioned functions defined in the method of the embodiment of the present disclosure are performed.
  • the computer-readable medium mentioned above in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the above two.
  • the computer-readable storage medium may be, for example, but is not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or any combination thereof.
  • Computer readable storage media may include, but are not limited to: an electrical connection having one or more conductors, a portable computer disk, a hard drive, random access memory (RAM), read only memory (ROM), erasable Programmable Read Only Memory (Erasable Programmable Read Only Memory, EPROM) or flash memory, optical fiber, portable compact disk read only memory (Compact Disc Read Only Memory, CD-ROM), optical storage device, magnetic storage device, or any of the above suitable combination.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, carrying computer-readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium that can send, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device .
  • Program code contained on a computer-readable medium can be transmitted using any appropriate medium, including but not limited to: wires, optical cables, radio frequency (Radio Frequency, RF), etc., or any suitable combination of the above.
  • the above-mentioned computer-readable medium may be included in the above-mentioned electronic device; it may also exist independently without being assembled into the electronic device.
  • the computer-readable medium carries one or more programs.
  • the electronic device When the one or more programs are executed by the electronic device, the electronic device performs the method shown in the above embodiment.
  • Computer program code for performing the operations of the present disclosure may be written in one or more programming languages, including object-oriented programming languages such as Java, Smalltalk, C++, and conventional Procedural programming language—such as "C" or a similar programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer can be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or it can be connected to an external computer ( For example, using an Internet service provider to connect via the Internet).
  • LAN Local Area Network
  • WAN Wide Area Network
  • each block in the flowchart or block diagram may represent a module, segment, or portion of code that contains one or more logic functions that implement the specified executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown one after another may actually execute substantially in parallel, or they may sometimes execute in the reverse order, depending on the functionality involved.
  • each block of the block diagram and/or flowchart illustration, and combinations of blocks in the block diagram and/or flowchart illustration can be implemented by special purpose hardware-based systems that perform the specified functions or operations. , or can be implemented using a combination of specialized hardware and computer instructions.
  • the units involved in the embodiments of the present disclosure can be implemented in software or hardware. Among them, the name of the unit does not constitute a limitation on the unit itself under certain circumstances.
  • the first acquisition A unit may also be described as "a unit that obtains at least two Internet Protocol addresses.”
  • exemplary types of hardware logic components include: Field-Programmable Gate Array (FPGA), Application Specific Integrated Circuit (Application Specific Integrated Circuit, ASIC), Application Specification Standard Product (Application Specification) Specific Standard Parts (ASSP), System On Chip (SOC), Complex Programmable Logic Device (CPLD), etc.
  • FPGA Field-Programmable Gate Array
  • ASIC Application Specific Integrated Circuit
  • ASSP Application Specification Standard Product
  • SOC System On Chip
  • CPLD Complex Programmable Logic Device
  • a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or devices, or any suitable combination of the foregoing.
  • machine-readable storage media may include an electrical connection based on one or more wires, a portable computer disk, a hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • RAM random access memory
  • ROM read only memory
  • EPROM or flash memory erasable programmable read only memory
  • CD-ROM portable compact disk read-only memory
  • magnetic storage device or any suitable combination of the above.
  • a service request processing method including:
  • Obtain a target account which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes; determine the corresponding key business node according to the target account, and the key business node is When performing access interception on illegal requests initiated by the target account, the service node with the best interception effect among the at least two service nodes shall perform access interception on the service request sent by the target account based on the key business node.
  • determining the corresponding key business node according to the target account includes: obtaining the first business request sent by the target account; determining each of the key business nodes according to the first business request.
  • the interception revenue corresponding to the business node, the interception revenue represents the effective interception time for intercepting the attacker belonging to the target account at the corresponding business node based on the unit computing resources; according to the interception revenue, the key business node is determined .
  • determining the interception revenue corresponding to each of the service nodes according to the first service request includes: based on preset unit computing resources, for the first service sent by the target account Request, conduct access interception at different business nodes, and record the first moment corresponding to each business node, the first moment being the start time of the access interception; detect the message sent by the target account for the different services
  • the node makes a second service request, and records the second moment corresponding to the second service request, where the second service request is a service request that bypasses the access interception, and the second moment is when the first service request is received. 2.
  • the time of the service request based on the first time and the second time, determine the interception revenue corresponding to each of the service nodes.
  • performing access interception on the service request sent by the target account based on the key business node includes: determining an interception strategy based on the key business node, and the interception strategy represents a preset The total computing resources are allocated to each of the business nodes; according to the interception policy, the business request sent by the target account is intercepted at the key business node and at least one other business node.
  • obtaining the target account includes: identifying the target account based on multi-dimensional characteristics of daily business requests.
  • identifying the target account according to the multi-dimensional characteristics of the daily business request includes: obtaining the multi-dimensional characteristics of the daily business request; and applying the multi-dimensional characteristics to the daily business request according to the multi-dimensional characteristics.
  • business request pair According to The number of accounts in each clustered account determines the target clustered account, and the account in the target clustered account is the target account.
  • the multi-dimensional features include at least two of the following categories: account features, device features, behavior features, and content features.
  • the method further includes: obtaining appeal data, which is appeal information sent by the target account against the access interception; and updating the appeal data according to the appeal data.
  • Target account and/or interception policy wherein the interception policy is a policy for access interception of service requests sent by the target account.
  • updating the target account and/or interception strategy according to the complaint data includes: clustering according to the content of the complaint data, and obtaining a first complaint sample and a second complaint Samples, wherein the first appeal sample is appeal information sent by a normal account, and the second appeal sample is an account with the risk of initiating illegal requests to the target business; according to the first appeal sample and/or the second appeal sample Appeal sample, update the targeted account and/or blocking policy.
  • a service request processing device including:
  • An acquisition module configured to acquire a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
  • Determination module configured to determine the corresponding key business node according to the target account.
  • the interception effect is the best among the at least two business nodes. business nodes;
  • the interception module is used to access and intercept business requests sent by the target account based on the key business nodes.
  • the determination module is specifically configured to: obtain the first service request sent by the target account; and determine the interception revenue corresponding to each of the service nodes according to the first service request.
  • the interception revenue represents the effective interception time of intercepting the attacker belonging to the target account at the corresponding business node based on the unit computing resources; the key business node is determined based on the interception revenue.
  • the determination module when determining the interception revenue corresponding to each of the service nodes according to the first service request, is specifically configured to: based on the preset unit computing resources, for all The first business request sent by the target account is accessed and intercepted at different business nodes, and the first time corresponding to each of the business nodes is recorded, and the first time is the start time of the access interception; detecting the target The account sends a second service request for the different service nodes, and records the second time corresponding to the second service request, where the second service request is a service request that bypasses the access interception, and the third The second time is the time when the second service request is received; based on the first time and the second time, the interception revenue corresponding to each of the service nodes is determined.
  • the interception module is specifically configured to: determine an interception strategy based on the key business nodes, and the interception strategy represents the calculation of the preset total computing resources in each of the business nodes.
  • Resource allocation According to the interception policy, the business request sent by the target account is intercepted at the key business node and at least one other business node.
  • the acquisition module is specifically configured to: detect daily business requests; and identify the target account according to the multi-dimensional characteristics of the daily business requests.
  • the acquisition module is based on the multi-dimensional characteristics of the daily business request, When identifying the target account, it is specifically used to: obtain the multi-dimensional characteristics of the daily business request; cluster the accounts corresponding to the daily business request according to the multi-dimensional characteristics to obtain multiple clustered accounts.
  • a class account is a set of multiple accounts with the same clustering characteristics, where the clustering characteristics are a subset of the multi-dimensional characteristics; the target clustered account is determined according to the number of accounts in each clustered account. , the account in the target clustered account is the target account.
  • the multi-dimensional features include at least two of the following categories: account features, device features, behavior features, and content features.
  • the acquisition module is further configured to: obtain appeal data, which is appeal information sent by the target account against the access interception; according to the appeal data, Update the target account and/or interception policy, where the interception policy is a policy for access interception of service requests sent by the target account.
  • the acquisition module when updating the target account and/or interception policy according to the complaint data, is specifically configured to: perform clustering according to the content of the complaint data, and obtain A first appeal sample and a second appeal sample, wherein the first appeal sample is appeal information sent by a normal account, and the second appeal sample is an account with the risk of initiating illegal requests to the target business; according to the first appeal sample and/or the second appeal sample, and update the target account and/or blocking policy.
  • an electronic device including: a processor, and a memory communicatively connected to the processor;
  • the memory stores computer execution instructions
  • the processor executes computer execution instructions stored in the memory to implement the service request processing method described in the first aspect and various possible designs of the first aspect.
  • a computer-readable storage medium is provided.
  • Computer-executable instructions are stored in the computer-readable storage medium.
  • a processor executes the computer-executed instructions, Implement the service request processing method described in the first aspect and various possible designs of the first aspect.
  • embodiments of the present disclosure provide a computer program product, including a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
  • embodiments of the present disclosure provide a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Provided in the embodiments of the present disclosure are a service request processing method and apparatus, and an electronic device and a storage medium. The method comprises: acquiring a target account, wherein the target account is an account which has a risk of initiating an illegitimate request to a target service, and the target service has at least two service nodes; determining a corresponding key service node according to the target account, wherein the key service node is a service node which has the best interception effect for performing access interception on the illegitimate request that is initiated by the target account; and on the basis of the key service node, performing access interception on a service request, which is sent by the target account. A key service node having a better interception effect in a target service is evaluated, and then on the key service node, access interception is performed on an illegitimate request, which is initiated by a target account.

Description

业务请求处理方法、装置、电子设备及存储介质Business request processing method, device, electronic equipment and storage medium
相关申请交叉引用Related application cross-references
本申请要求于2022年08月26日提交中国专利局、申请号为202211037837.4、发明名称为“业务请求处理方法、装置、电子设备及存储介质”的中国专利申请的优先权,其全部内容通过引用并入本文。This application claims priority to the Chinese patent application submitted to the China Patent Office on August 26, 2022, with application number 202211037837.4 and the invention name "Business Request Processing Method, Device, Electronic Equipment and Storage Medium", the entire content of which is incorporated by reference. Incorporated herein.
技术领域Technical field
本公开实施例涉及互联网技术领域,尤其涉及一种业务请求处理方法、装置、电子设备及存储介质。The embodiments of the present disclosure relate to the field of Internet technology, and in particular, to a service request processing method, device, electronic device, and storage medium.
背景技术Background technique
当前,随着互联网行业的快速发展,利用互联网技术实施的网络攻击、窃取信息、勒索诈骗等非法行为也愈发增多,各类互联网平台通常会设置风控机制,对此类非法业务请求进行拦截,以保证平台中内容和信息的安全。Currently, with the rapid development of the Internet industry, illegal behaviors such as cyber attacks, information theft, extortion and fraud using Internet technology are also increasing. Various Internet platforms usually set up risk control mechanisms to intercept such illegal business requests. , to ensure the security of content and information on the platform.
现有技术中,针对用于实现非法业务目的非法请求,平台通常是基于人工或固定规则审核的方式进行识别,之后对发送非法请求的非法账户进行拦截,以阻止此类非法账户继续发送非法请求。In the existing technology, for illegal requests used to achieve illegal business purposes, the platform usually identifies illegal requests based on manual or fixed rule review, and then intercepts illegal accounts that send illegal requests to prevent such illegal accounts from continuing to send illegal requests. .
发明内容Contents of the invention
本公开实施例提供一种业务请求处理方法、装置、电子设备及存储介质。Embodiments of the present disclosure provide a service request processing method, device, electronic device, and storage medium.
第一方面,本公开实施例提供一种业务请求处理方法,包括:In a first aspect, embodiments of the present disclosure provide a service request processing method, including:
获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。Obtain a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes; determine the corresponding key business node according to the target account, and the key business node is When performing access interception on illegal requests initiated by the target account, the service node with the best interception effect among the at least two service nodes shall perform access interception on the service request sent by the target account based on the key business node.
第二方面,本公开实施例提供一种业务请求处理装置,包括:In a second aspect, an embodiment of the present disclosure provides a service request processing device, including:
获取模块,用于获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;An acquisition module, configured to acquire a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
确定模块,用于根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;Determination module, configured to determine the corresponding key business node according to the target account. When the key business node performs access interception for illegal requests initiated by the target account, the interception effect is the best among the at least two business nodes. business nodes;
拦截模块,用于基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。The interception module is used to access and intercept business requests sent by the target account based on the key business nodes.
第三方面,本公开实施例提供一种电子设备,包括:In a third aspect, an embodiment of the present disclosure provides an electronic device, including:
处理器,以及与所述处理器通信连接的存储器;A processor, and a memory communicatively connected to the processor;
所述存储器存储计算机执行指令; The memory stores computer execution instructions;
所述处理器执行所述存储器存储的计算机执行指令,以实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。The processor executes computer execution instructions stored in the memory to implement the service request processing method described in the first aspect and various possible designs of the first aspect.
第四方面,本公开实施例提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,当处理器执行所述计算机执行指令时,实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium. Computer-executable instructions are stored in the computer-readable storage medium. When the processor executes the computer-executable instructions, the above first aspect and the first aspect are implemented. Various possible designs for the described business request processing methods.
第五方面,本公开实施例提供一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。In a fifth aspect, embodiments of the present disclosure provide a computer program product, including a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
第六方面,本公开实施例提供一种计算机程序,所述计算机程序被处理器执行时实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。In a sixth aspect, embodiments of the present disclosure provide a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
本公开实施例提供的业务请求处理方法、装置、电子设备及存储介质,通过获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。由于在对目标账户发起的非法请求进行拦截前,首先评估目标业务中具有更好拦截效果的关键业务节点,之后在关键业务节点上对目标账户发起的非法请求进行访问拦截。The business request processing method, device, electronic device and storage medium provided by the embodiments of the present disclosure obtain the target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes. ; According to the target account, determine the corresponding key business node. The key business node is the business node with the best interception effect among the at least two business nodes when access interception is performed for illegal requests initiated by the target account; Based on the key business node, access interception is performed on the business request sent by the target account. Because before intercepting illegal requests initiated by the target account, the key business nodes in the target business with better interception effects are first evaluated, and then access interception of illegal requests initiated by the target account is performed on the key business nodes.
附图说明Description of drawings
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, a brief introduction will be made below to the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description These are some embodiments of the present disclosure. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without exerting any creative effort.
图1为本公开实施例提供的业务请求处理方法的一种应用场景图;Figure 1 is an application scenario diagram of the business request processing method provided by an embodiment of the present disclosure;
图2为本公开实施例提供的业务请求处理方法流程示意图一;Figure 2 is a schematic flowchart 1 of a service request processing method provided by an embodiment of the present disclosure;
图3为图2所示实施例中步骤S102的具体实现步骤流程图;Figure 3 is a flow chart of specific implementation steps of step S102 in the embodiment shown in Figure 2;
图4为本公开实施例提供的一种针对业务节点进行访问拦截的示意图;Figure 4 is a schematic diagram of access interception for business nodes provided by an embodiment of the present disclosure;
图5为图3所示实施例中步骤S1022的具体实现步骤流程图;Figure 5 is a flow chart of specific implementation steps of step S1022 in the embodiment shown in Figure 3;
图6为图2所示实施例中步骤S103的具体实现步骤流程图;Figure 6 is a flow chart of specific implementation steps of step S103 in the embodiment shown in Figure 2;
图7为本公开实施例提供的业务请求处理方法的流程示意图二;Figure 7 is a schematic flowchart 2 of a service request processing method provided by an embodiment of the present disclosure;
图8为本公开实施例提供的一种行为特征的示意图;Figure 8 is a schematic diagram of a behavioral feature provided by an embodiment of the present disclosure;
图9为图7所示实施例中步骤S207的具体实现步骤流程图;Figure 9 is a flow chart of specific implementation steps of step S207 in the embodiment shown in Figure 7;
图10为本公开实施例提供的业务请求处理装置的结构框图;Figure 10 is a structural block diagram of a service request processing device provided by an embodiment of the present disclosure;
图11为本公开实施例提供的一种电子设备的结构示意图;Figure 11 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure;
图12为本公开实施例提供的电子设备的硬件结构示意图。FIG. 12 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present disclosure.
具体实施方式Detailed ways
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附 图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure more clear, the following will be combined with the appended information in the embodiments of the present disclosure. The figures clearly and completely describe the technical solutions in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, rather than all of the embodiments. Based on the embodiments in this disclosure, all other embodiments obtained by those of ordinary skill in the art without making creative efforts fall within the scope of protection of this disclosure.
下面对本公开实施例的应用场景进行解释:The application scenarios of the embodiments of the present disclosure are explained below:
图1为本公开实施例提供的业务请求处理方法的一种应用场景图,本公开实施例提供的业务请求处理方法,可以应用于互联网平台的安全防护、风控管理的应用场景中,更具体地,例如应用于社交平台的安全防护的应用场景。示例性地,本公开实施例提供的方法,可以应用于风控服务器,其中,一种可能的实现方式中,如图1所示,风控服务器与平台服务器连接,由终端设备发送的外部请求首先进入风控服务器,由风控服务器进行处理,识别并拦截其中的非法请求,之后,将正常的合法请求发送至平台服务器,并由平台服务器对其进行响应,生成例如用户留言、发布信息等平台内容。Figure 1 is an application scenario diagram of the business request processing method provided by the embodiment of the present disclosure. The business request processing method provided by the embodiment of the present disclosure can be applied to the application scenarios of security protection and risk control management of the Internet platform. More specifically, places, such as application scenarios for security protection on social platforms. Illustratively, the method provided by the embodiment of the present disclosure can be applied to the risk control server. In one possible implementation, as shown in Figure 1, the risk control server is connected to the platform server, and the external request sent by the terminal device First, enter the risk control server, and the risk control server will process it, identify and intercept illegal requests, and then send normal legal requests to the platform server, and the platform server will respond to them and generate user messages, release information, etc. Platform content.
当前,随着互联网行业的快速发展,利用互联网技术实施的网络攻击、窃取信息、勒索诈骗等非法行为也愈发增多,例如包括在互联网社交平台上推广非法网站、刊登诈骗信息等,从而获得非法收益。其中,上述非法行为通常是利用互联网技术自动向平台服务器发送业务请求,从而批量地在互联网社交平台上注册账户,并伪装成真实用户发布非法内容而实现的。现有技术中,针对用于实现非法业务目的业务请求,社交平台通常是基于规则进行识别,之后对发送非法请求的非法账户在固定业务节点进行拦截,以阻止此类非法账户继续发送非法请求。例如,在检测到刊登诈骗网站的请求后,标记发送该非法请求的账户,并在该账户的登录业务节点,对其进行拦截,阻止其登录平台。然而,基于固定节点的拦截方式,很容易被发送非法请求的攻击方识别并通过修改发送参数而绕过拦截,导致拦截效果差,拦截准确性低的问题。At present, with the rapid development of the Internet industry, illegal behaviors such as cyber attacks, information theft, extortion and fraud using Internet technology are also increasing. For example, including promoting illegal websites on Internet social platforms, publishing fraudulent information, etc., thereby obtaining illegal income. Among them, the above-mentioned illegal behaviors are usually achieved by using Internet technology to automatically send business requests to the platform server, thereby registering accounts on Internet social platforms in batches, and disguising themselves as real users to publish illegal content. In the existing technology, social platforms usually identify business requests for illegal business purposes based on rules, and then intercept illegal accounts that send illegal requests at fixed business nodes to prevent such illegal accounts from continuing to send illegal requests. For example, after detecting a request to publish a fraudulent website, mark the account that sent the illegal request, intercept it at the login business node of the account, and prevent it from logging into the platform. However, the interception method based on fixed nodes can be easily identified by attackers who send illegal requests and bypass the interception by modifying the sending parameters, resulting in poor interception effects and low interception accuracy.
本公开实施例提供一种业务请求处理方法以解决上述问题。参考图2,图2为本公开实施例提供的业务请求处理方法流程示意图一。本实施例的方法可以应用在服务器中,该业务请求处理方法包括:Embodiments of the present disclosure provide a service request processing method to solve the above problems. Referring to Figure 2, Figure 2 is a schematic flowchart 1 of a service request processing method provided by an embodiment of the present disclosure. The method in this embodiment can be applied in the server. The service request processing method includes:
步骤S101:获取目标账户,目标账户为具有向目标业务发起非法请求风险的账户,目标业务具有至少两个业务节点。Step S101: Obtain a target account. The target account is an account with the risk of initiating illegal requests to the target business. The target business has at least two business nodes.
示例性地,目标账户是在服务器注册的所有账户的一个子集,更具体的,即上述应用场景介绍中的非法账户,本实施例中的目标账户,是由一个攻击方(非法团伙)批量注册的,在一个或多个维度上具有相似特征的聚集性账户。Illustratively, the target account is a subset of all accounts registered on the server, more specifically, the illegal account in the above application scenario introduction. The target account in this embodiment is a batch of accounts registered by an attacker (illegal gang). Registered, aggregated accounts with similar characteristics in one or more dimensions.
进一步地,目标账户可以是指有过发送非法请求的记录,或者根据评估具有发送非法请求的可能的账户,其中,非法请求是向服务器发送的包含非法内容的业务请求,非法内容例如为诈骗信息、非法网站信息等。非法请求在被服务器响应后,会在对应的网络平台上对该非法信息进行展示。其中,目标账户可以通过预设在服务器内的账户数据而获得,也可以通过实时检测不同账户发送的业务请求并进行评估后确定,此处不进行具体限定。Further, the target account may refer to an account that has a record of sending illegal requests, or has the possibility of sending illegal requests based on assessment, where an illegal request is a business request containing illegal content sent to the server, and the illegal content is, for example, fraud information. , illegal website information, etc. After the illegal request is responded to by the server, the illegal information will be displayed on the corresponding network platform. Among them, the target account can be obtained through account data preset in the server, or can be determined by detecting business requests sent by different accounts in real time and evaluating them. There is no specific limitation here.
进一步地,目标账户发起的非法请求对应目标业务,目标业务例如为在社交平台发布状态、发布评论等业务。其中,目标业务具有至少两个业务节点,例如,目标业务为社交平台发布状态,该目标业务对应的业务节点包括:“注册账户”、“登录账户”、“关注好友”、“发布状态”。其中,示例性地,为实现目标业务(社交平台发布状态),目标账户需要分别向各业 务节点发送业务请求,从而最终实现向目标业务发送非法请求(在社交平台发布包含非法内容的状态)的目的。Further, the illegal request initiated by the target account corresponds to the target business. The target business is, for example, publishing status on social platforms, publishing comments, and other services. Among them, the target business has at least two business nodes. For example, the target business is publishing status on a social platform. The business nodes corresponding to the target business include: "Register Account", "Login Account", "Follow Friends", and "Publishing Status". Among them, for example, in order to achieve the target business (social platform publishing status), the target account needs to report to various industries respectively. The service node sends a service request, thereby ultimately achieving the purpose of sending an illegal request to the target business (posting a status containing illegal content on the social platform).
步骤S102:根据目标账户,确定对应的关键业务节点,关键业务节点为针对目标账户发起的非法请求进行访问拦截时,至少两个业务节点中拦截效果最好的业务节点。Step S102: Determine the corresponding key business node according to the target account. The key business node is the business node with the best interception effect among at least two business nodes when access interception is performed on illegal requests initiated by the target account.
示例性地。在获得目标账户后,基于目标账户的特征,确定对应的关键业务节点,即针对目标账户发起的非法请求进行访问拦截时,拦截效果最好的业务节点。其中,本实施例中的“拦截效果最好的业务节点”的具体实现有多种,例如,对非法请求的拦截率最高的业务节点;例如,拦截过程中计算资源消耗最少的业务节点;再例如,对非法请求进行拦截的有效拦截时长最大的业务节点。By way of example. After obtaining the target account, based on the characteristics of the target account, the corresponding key business node is determined, that is, the business node with the best interception effect when intercepting illegal requests initiated by the target account. Among them, there are many specific implementations of "the business node with the best interception effect" in this embodiment, for example, the business node with the highest interception rate for illegal requests; for example, the business node with the least consumption of computing resources during the interception process; and then For example, the business node with the longest effective interception time for intercepting illegal requests.
示例性地,基于目标账户的特征确定对应的关键业务节点的数量有多种,例如,目标账户的特征为目标账户的数量,根据目标账户的数量,确定对应的关键业务节点;再例如,目标账户的特征为目标账户对应的历史拦截记录;通过获取对目标账户进行拦截的历史记录,判断针对目标账户在各业务节点上拦截的效果,从而确定关键业务节点。For example, there are many ways to determine the number of corresponding key business nodes based on the characteristics of the target account. For example, the characteristics of the target account are the number of target accounts, and the corresponding key business nodes are determined based on the number of target accounts; for another example, the target The characteristics of the account are the historical interception records corresponding to the target account; by obtaining the historical interception records of the target account, the effect of interception on each business node for the target account is judged, thereby determining the key business nodes.
示例性地,如图3所示,步骤S102的具体实现步骤包括:For example, as shown in Figure 3, the specific implementation steps of step S102 include:
步骤S1021:获取目标账户发送的第一业务请求。Step S1021: Obtain the first service request sent by the target account.
步骤S1022:根据第一业务请求,确定各业务节点对应的拦截收益,拦截收益表征基于单位计算资源,在对应的业务节点对目标账户归属的攻击方进行拦截的有效拦截时长。Step S1022: According to the first service request, determine the interception revenue corresponding to each business node. The interception revenue represents the effective interception time of intercepting the attacker belonging to the target account at the corresponding business node based on the unit's computing resources.
示例性地,在确定目标账户后,检测目标账户发送的业务请求,当检测到目标账户发送的第一业务请求后,对该第一业务请求在不同业务节点进行拦截,并评估拦截效果,即拦截收益。例如,基于相同的计算资源,在A业务节点进行拦截后,经过2小时后,发送非法请求的攻击方通过改变参数,绕过了在A业务节点的访问拦截;在B业务节点进行拦截后,经过8小时后,发送非法请求的攻击方通过改变参数,绕过了在B业务节点的访问拦截。即在B业务节点的有效拦截时长更长,拦截收益更高。For example, after the target account is determined, the service request sent by the target account is detected. When the first service request sent by the target account is detected, the first service request is intercepted at different service nodes, and the interception effect is evaluated, that is, Interception earnings. For example, based on the same computing resources, after interception at business node A, 2 hours later, the attacker who sent the illegal request bypassed the access interception at business node A by changing parameters; after interception at business node B, After 8 hours, the attacker who sent the illegal request bypassed the access interception at the B business node by changing the parameters. That is, the effective interception time at the B business node is longer and the interception income is higher.
图4为本公开实施例提供的一种针对业务节点进行访问拦截的示意图,下面结合图4对确定各业务节点对应的拦截收益的过程进行介绍,如图4所示,目标业务为在“社交平台发布状态”的业务,该目标业务包括“登录节点”、“状态编辑节点”、“状态展示节点”,为实现社交平台发布状态的目的,需要依次向各业务节点(“登录节点”、“状态编辑节点”、“状态展示节点”)发送第一业务请求,其中,第一业务请求包括三个子请求,即针对“登录节点”的第一子请求;针对“状态编辑节点”的第二子请求;针对“状态展示节点”的第三子请求。示例性地,目标账户包括N个账户,N为大于2的整数,其中,将目标账户划分为三个账户集合,即账户集合A、账户集合B和账户集合C。在检测到目标账户发送业务请求时,针对账户集合A中的各账户,拦截其向“登录节点”发送的第一业务请求(即拦截第一子请求),从而使账户集合A中的账户,在“登录节点”被拦截,无法进行账户登录;针对账户集合B中的各账户,不在“登录节点”进行访问拦截,而拦截其向“状态编辑节点”发送的第一业务请求(即拦截第二子请求),从而使账户集合B中的账户,在“状态编辑节点”被拦截,即能够进行账户登录,但无法编辑状态内容;针对账户集合C中的各账户,不在“登录节点”和“状态编辑节点”进行访问拦截,而拦截其向“状态展示节点”发送的第一业务请求(即拦截第三子请求),从而使账户集合C中的账户,在“状态展示节点”被拦截,即账户集合C 中的账户能够进行账户登录和编辑状态内容,但无法在社交平台展示状态内容。Figure 4 is a schematic diagram of access interception for business nodes provided by an embodiment of the present disclosure. The process of determining the interception revenue corresponding to each business node is introduced below in conjunction with Figure 4. As shown in Figure 4, the target business is in the "social network""Platform Release Status" business. The target business includes "Login Node", "Status Editing Node", and "Status Display Node". In order to achieve the purpose of publishing status on the social platform, each business node ("Login Node", "Status Display Node") needs to be sent to each business node ("Login Node", "Status Display Node"). "Status Editing Node", "Status Display Node") sends the first service request, where the first service request includes three sub-requests, namely the first sub-request for the "Login Node"; the second sub-request for the "Status Editing Node"Request; third subrequest for "status display node". For example, the target account includes N accounts, where N is an integer greater than 2, where the target account is divided into three account sets, namely account set A, account set B, and account set C. When it is detected that the target account sends a business request, for each account in account set A, the first business request sent to the "login node" is intercepted (that is, the first sub-request is intercepted), so that the accounts in account set A, It is intercepted at the "login node" and account login cannot be performed; for each account in account set B, access interception is not performed at the "login node", but the first business request sent to the "status editing node" is intercepted (that is, the first business request sent to the "status editing node" is intercepted) Two sub-requests), so that the accounts in account set B are intercepted at the "status editing node", that is, the account can be logged in, but the status content cannot be edited; for each account in account set C, the account is not in the "login node" and The "status editing node" performs access interception and intercepts the first business request sent to the "status display node" (that is, intercepts the third sub-request), so that the accounts in account set C are intercepted at the "status display node" , that is, the account set C Accounts in can log in and edit status content, but cannot display status content on social platforms.
进一步地,在上述过程实施后,对目标账户在不同业务节点分别进行了拦截,使目标账户无法对目标业务进行方案。然而,在实践过程中,针对上述拦截行为,利用目标账户发送非法请求的攻击方,会通过调整修改程序脚本等方式,改变发送的业务请求中的参数,例如改变业务请求中的内容关键字、登录信息等,来避开拦截,达到正常触发目标业务(例如在社交平台发布包含非法信息的状态)的目的。但是,针对不同的业务节点上的访问拦截,发送非法请求的攻击方识别拦截规则,并避开拦截的时间成本、计算资源成本是不一样的,例如,在“登录节点”进行访问拦截后,攻击方可以通过程序脚本直接重新注册新的账户发起攻击,因此攻击方避免拦截所花费的时间成本和计算资源成本相对较低,也即有效拦截时长较短;而在“状态展示节点”进行访问拦截后,攻击方通过目标账户需要依次向“登录节点”、“状态编辑节点”等多个节点发送请求,同时需要分析非法内容无法在社交平台展示的原因和规则,才能避开拦截,因此需要花费更多的计算资源成本和时间成本,也即有效拦截时长较长。以上介绍仅是示例性地,在实际应用过程中,在不同的业务节点对目标账户归属的攻击方进行拦截的有效拦截时长受到多种因素影响,因此,可以通过检测每一业务节点实际的有效拦截时长,来确定各业务节点对应的拦截收益。Further, after the above process is implemented, the target account is intercepted at different business nodes, so that the target account cannot plan the target business. However, in practice, in response to the above interception behavior, the attacker who uses the target account to send illegal requests will change the parameters in the business request sent by adjusting and modifying the program script, such as changing the content keywords in the business request, Login information, etc., to avoid interception and achieve the purpose of triggering the target business normally (such as posting a status containing illegal information on a social platform). However, for access interception on different business nodes, the time cost and computing resource cost of the attacker who sends the illegal request to identify the interception rules and avoid the interception are different. For example, after the "login node" performs access interception, The attacker can directly re-register a new account through the program script to launch the attack. Therefore, the time cost and computing resource cost spent by the attacker to avoid interception are relatively low, that is, the effective interception time is short; while accessing at the "status display node" After interception, the attacker needs to send requests to multiple nodes such as "login node" and "status editing node" through the target account. At the same time, he needs to analyze the reasons and rules why illegal content cannot be displayed on social platforms in order to avoid interception. Therefore, it is necessary to It costs more computing resources and time, that is, the effective interception time is longer. The above introduction is only exemplary. In the actual application process, the effective interception time of intercepting the attacker belonging to the target account at different business nodes is affected by many factors. Therefore, the actual effective interception time of each business node can be detected. The interception duration is used to determine the interception revenue corresponding to each business node.
在一种可能的实现方式中,如图5所示,步骤S1022的实现方式包括:In a possible implementation, as shown in Figure 5, the implementation of step S1022 includes:
步骤S1022A:基于预设的单位计算资源,针对目标账户发送的第一业务请求,分别在不同业务节点进行访问拦截,并记录各业务节点对应的第一时刻,第一时刻为访问拦截的开始时刻。Step S1022A: Based on the preset unit computing resources, perform access interception at different business nodes for the first service request sent by the target account, and record the first time corresponding to each business node. The first time is the start time of access interception. .
步骤S1022B:检测目标账户发送的针对不同业务节点第二业务请求,并记录第二业务请求对应的第二时刻,其中,第二业务请求为绕过访问拦截的业务请求,第二时刻为接收到第二业务请求的时刻。Step S1022B: Detect the second service request for different service nodes sent by the target account, and record the second time corresponding to the second service request, where the second service request is a service request that bypasses access interception, and the second time is when the second service request is received The time of the second service request.
步骤S1022C:根据第一时刻和第二时刻,确定各业务节点对应的拦截收益。Step S1022C: Determine the interception revenue corresponding to each service node based on the first time and the second time.
步骤S1023:根据拦截收益,确定关键业务节点。Step S1023: Determine key business nodes based on interception revenue.
示例性地,计算资源例如包括线程资源、内存资源、网络资源等,以单位计算资源,即预设大小的计算资源,具体不限定,根据单位计算资源对目标账户中的部分账户分别在不同业务节点进行拦截后,记录对应的时间节点,即第一时刻;之后,检测目标账户发送的针对各业务节点的第二业务请求,获得接收到第二业务请求的时刻,即第二时刻,其中,第二业务请求即绕过访问拦截的业务请求。示例性地,第一业务请求中包含的非法信息为“www.xxx.cn”(例如为一个诈骗网站);服务器针对第一业务请求在“状态展示节点”进行拦截,将非法信息“www.xxx.cn”替换为字符串“######”;之后攻击方修改请求参数,将非法信息“www.xxx.cn”修改为“www(/).xxx(/).cn(/)”,并根据该修改后的非法信息,生成第二业务请求,来规避服务器对第一业务请求中的非法信息“www.xxx.cn”的识别,从而实现绕过访问拦截的目的。因此,当服务器基于人工或预训练的识别模型,检测到业务请求中包含“www(/).xxx(/).cn(/)”此类的内容时,视为检测到为第二业务请求。其中具体的识别方法,此处不再赘述。Illustratively, computing resources include, for example, thread resources, memory resources, network resources, etc. The computing resources are calculated in units, that is, computing resources of a preset size. The specifics are not limited. According to the unit computing resources, some accounts in the target account are used in different businesses. After the node intercepts, it records the corresponding time node, that is, the first moment; then, detects the second service request sent by the target account for each service node, and obtains the moment when the second service request is received, that is, the second moment, where, The second service request is a service request that bypasses access interception. For example, the illegal information contained in the first service request is "www.xxx.cn" (for example, a fraudulent website); the server intercepts the first service request at the "status display node" and displays the illegal information "www. xxx.cn" is replaced with the string "######"; then the attacker modifies the request parameters and changes the illegal information "www.xxx.cn" to "www(/).xxx(/).cn(/ )", and generate a second service request based on the modified illegal information to avoid the server's identification of the illegal information "www.xxx.cn" in the first service request, thereby achieving the purpose of bypassing access interception. Therefore, when the server detects that a business request contains content such as "www(/).xxx(/).cn(/)" based on a manual or pre-trained recognition model, it is deemed to be a second business request. . The specific identification methods will not be described again here.
之后,根据第一时刻和第二时刻的差值,即可确定在对应的业务节点进行访问拦截的有效拦截时长,从而得到拦截收益。进一步地,将拦截收益最大的业务节点,确定为关键业务 节点。Afterwards, based on the difference between the first moment and the second moment, the effective interception duration of access interception at the corresponding business node can be determined, thereby obtaining interception benefits. Furthermore, the business node with the greatest interception revenue is determined as the key business node.
本实施例步骤中,在实际进行风控检测的过程中,针对攻击方不断变化攻击方式、修改参数绕过拦截的问题,通过不断检测各业务节点的拦截收益,将拦截收益最大的业务节点作为关键业务节点,并在后续步骤中,基于关键业务节点对攻击方发起的非法请求进行访问拦截,提高攻击方的网络攻击成本,从而提高对非法请求的拦截效率,提高计算资源利用率。In the steps of this embodiment, during the actual risk control detection process, in order to solve the problem of the attacker constantly changing attack methods and modifying parameters to bypass interception, the interception revenue of each business node is continuously detected, and the business node with the largest interception revenue is selected as Key business nodes, and in subsequent steps, based on the key business nodes, illegal requests initiated by the attacker are accessed and intercepted, thereby increasing the attacker's network attack cost, thereby improving the interception efficiency of illegal requests and improving computing resource utilization.
步骤S103:基于关键业务节点,对目标账户发送的业务请求进行访问拦截。Step S103: Based on the key business nodes, perform access interception on the service requests sent by the target account.
示例性地,在确定关键业务节点后,基于关键业务节点对目标账户发送的业务请求进行访问拦截,使拦截效率动态最大化。例如,当关键业务节点为社交平台中的“添加好友”的业务节点时,攻击方通过程序脚本,可以批量注册的“目标账户”,并通过发送业务请求进行用户登录、点赞等操作,但无法进行“添加好友”;而当攻击方通过修改参数,再次发送非法请求后,关键业务节点基于各业务节点对应的拦截收益,可能会随之变化,例如变为社交平台中“发布信息”的业务节点,即攻击方可以通过发送业务请求进行用户登录、添加好友等操作,但无法发布信息。从而,实现对目标账户的动态访问拦截。For example, after the key business nodes are determined, access interception is performed on the business requests sent by the target account based on the key business nodes, so as to dynamically maximize the interception efficiency. For example, when the key business node is the "Add Friend" business node in a social platform, the attacker can register "target accounts" in batches through program scripts, and send business requests to perform operations such as user login and likes. However, "Add friends" cannot be performed; and when the attacker modifies the parameters and sends illegal requests again, the interception revenue of the key business nodes based on the corresponding business nodes may change accordingly, for example, it becomes the "post information" in the social platform. The business node, that is, the attacker can perform operations such as user login and adding friends by sending business requests, but cannot publish information. Thus, dynamic access interception to the target account is achieved.
在一种可能的实现方式中,如图6所示,步骤S103的具体实现步骤包括:In a possible implementation, as shown in Figure 6, the specific implementation steps of step S103 include:
步骤S1031:基于关键业务节点,确定拦截策略,拦截策略表征预设的总计算资源在各业务节点的计算资源分配。Step S1031: Determine an interception strategy based on key business nodes. The interception strategy represents the preset allocation of computing resources to each business node.
步骤S1032:根据拦截策略,在关键业务节点和至少一个其他业务节点对目标账户发送的业务请求进行拦截。Step S1032: According to the interception policy, intercept the service request sent by the target account at the key service node and at least one other service node.
示例性地,针对于互联网平台的安全防护、风控管理的应用场景中,风控服务器需要实时的处理大量的请求数据,向平台发送非法请求的攻击方同一时间存在多个,因此,对非法请求的拦截策略,需要考虑风控服务器的整体计算资源分配,保证对业务请求的处理实时性。具体地,在确定关键业务节点后,可以针对关键业务节点,分配较多的计算资源,例如对所有目标账户,仅在关键业务节点进行访问拦截;同时,在目标业务中除关键业务节点外的其他业务节点,分配少量计算资源,对目标账户中的一部分账户在其他业务节点进行拦截,从而形成更为复杂的拦截策略,在保证拦截可靠性的基础上,使攻击方破解和解析拦截规则的耗时更多、成本更高,从而进一步地提高非法请求的拦截效果,解决攻击方不断变化攻击方式、修改参数绕过拦截的问题。其中,拦截策略可以通过预训练的处理模型提供,即以目标业务和关键业务节点为输入,通过预训练的处理模型,输出对应的拦截策略。For example, in application scenarios for security protection and risk control management of Internet platforms, the risk control server needs to process a large amount of request data in real time. There are multiple attackers sending illegal requests to the platform at the same time. Therefore, illegal The request interception strategy needs to consider the overall computing resource allocation of the risk control server to ensure the real-time processing of business requests. Specifically, after determining the key business nodes, more computing resources can be allocated to the key business nodes. For example, access interception is only performed on all target accounts at the key business nodes; at the same time, in the target business except the key business nodes, Other business nodes allocate a small amount of computing resources to intercept some of the target accounts in other business nodes, thereby forming a more complex interception strategy. On the basis of ensuring the reliability of interception, the attacker can crack and parse the interception rules. It is more time-consuming and costly, thereby further improving the interception effect of illegal requests and solving the problem of attackers constantly changing attack methods and modifying parameters to bypass interception. Among them, the interception strategy can be provided through a pre-trained processing model, that is, the target business and key business nodes are used as input, and the corresponding interception strategy is output through the pre-trained processing model.
在本实施例中,通过获取目标账户,目标账户为具有向目标业务发起非法请求风险的账户,目标业务具有至少两个业务节点;根据目标账户,确定对应的关键业务节点,关键业务节点为针对目标账户发起的非法请求进行访问拦截时,拦截效果最好的业务节点;基于关键业务节点,对目标账户发送的业务请求进行访问拦截。由于在对目标账户发起的非法请求进行拦截前,首先评估目标业务中具有更好拦截效果的关键业务节点,之后在关键业务节点上对目标账户发起的非法请求进行访问拦截,提高对非法请求的拦截准确率,同时形成对目标账户的动态拦截,提高目标账户通过改变访问参数而绕过拦截的难度,提高计算资源的使用效率。In this embodiment, by obtaining the target account, the target account is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes; according to the target account, the corresponding key business node is determined, and the key business node is for When intercepting illegal requests initiated by the target account, the business node with the best interception effect is used; based on key business nodes, access interception is performed on the business requests sent by the target account. Because before intercepting illegal requests initiated by the target account, we first evaluate the key business nodes with better interception effects in the target business, and then intercept illegal requests initiated by the target account on the key business nodes, thereby improving the effectiveness of illegal requests. Interception accuracy, while forming a dynamic interception of the target account, making it more difficult for the target account to bypass interception by changing access parameters, and improving the efficiency of computing resources.
参考图7,图7为本公开实施例提供的业务请求处理方法的流程示意图二。本实施例在图2所示实施例的基础上,增加了确定目标账户和基于申诉数据对拦截策略进行更新的步骤,该 业务请求处理方法,包括:Referring to Figure 7, Figure 7 is a schematic flow chart 2 of a service request processing method provided by an embodiment of the present disclosure. Based on the embodiment shown in Figure 2, this embodiment adds the steps of determining the target account and updating the interception policy based on the complaint data. Business request processing methods, including:
步骤S201:检测日常业务请求。Step S201: Detect daily business requests.
步骤S202:获取日常业务请求的多维度特征。Step S202: Obtain multi-dimensional characteristics of daily business requests.
示例性地,在针对于互联网平台的安全防护、风控管理的应用场景中,风控服务器,即本实施例的执行主体,会对用户通过终端设备向风控服务器发送的业务请求进行无差别或随机检测,从而获得不同账户发送的业务请求,即日常业务请求。之后,获取日常业务请求对应的多维度特征,示例性地,多维度特征包括以下至少两类:账户特征,设备特征、行为特征、内容特征,下面详细对各特征进行介绍:For example, in the application scenario of security protection and risk control management for the Internet platform, the risk control server, that is, the execution subject of this embodiment, will perform indiscriminate processing on the business requests sent by the user to the risk control server through the terminal device. Or perform random detection to obtain business requests sent by different accounts, that is, daily business requests. Afterwards, multi-dimensional features corresponding to daily business requests are obtained. For example, multi-dimensional features include at least two of the following categories: account features, device features, behavioral features, and content features. Each feature is introduced in detail below:
账户特征,即发送该日常业务请求的账户的特征,例如账户标识(例如账户名称、账户头像)、账户创建时间、账户登记信息(例如账户中设置的年龄、性别、居住地等信息)等。一种可能的实现方式中,日常业务请求中可以包含发送该请求的账户的识别信息,通过识别信息可进一步确定账户特征。Account characteristics, that is, the characteristics of the account that sends the daily business request, such as account identification (such as account name, account avatar), account creation time, account registration information (such as age, gender, residence and other information set in the account), etc. In a possible implementation, the daily business request may include the identification information of the account that sends the request, and the account characteristics can be further determined through the identification information.
设备特征,即发送该日常业务请求的账户所登录的设备的特征,例如设备标识、设备型号、设备登录时间、设备网络地址等。一种可能的实现方式中,日常业务请求中可以包含发送该请求的设备的识别信息,通过识别信息可进一步确定设备特征。Device characteristics, that is, characteristics of the device logged in by the account that sent the daily business request, such as device identification, device model, device login time, device network address, etc. In one possible implementation, the daily service request may include the identification information of the device sending the request, and the device characteristics may be further determined through the identification information.
行为特征,行为特征表征同一账户发送的针对不同业务节点的日常业务请求的顺序,即向目标业务的各业务节点发送业务请求的顺序,也即,触发各业务节点的时序。行为特征可以通过多个日常业务请求的具体内容信息共同确定。图8为本公开实施例提供的一种行为特征的示意图,如图8所示,示例性地,对于一个具体账户Acc_1,若其发送的(多个)日常业务请求A(多个业务请求的集合),依次触发“用户登录”、“添加好友”、“好友评论区留言”的业务节点,则日常业务请求A对应的行为特征为行为特征a;若其发送的(多个)日常业务请求B(多个业务请求的集合),依次触发“用户登录”、“进入热榜话题”、“话题区留言”的业务节点,则日常业务请求B对应的行为特征为行为特征b。Behavioral characteristics characterize the order of daily business requests sent by the same account for different business nodes, that is, the order in which business requests are sent to each business node of the target business, that is, the timing of triggering each business node. Behavioral characteristics can be jointly determined through the specific content information of multiple daily business requests. Figure 8 is a schematic diagram of a behavioral feature provided by an embodiment of the present disclosure. As shown in Figure 8, for example, for a specific account Acc_1, if it sends (multiple) daily business requests A (multiple business requests Set), triggering the business nodes of "User Login", "Add Friend", and "Leave a Message in Friend Comment Area" in sequence, then the behavioral feature corresponding to daily business request A is behavioral feature a; if it sends (multiple) daily business requests B (a collection of multiple business requests) triggers the business nodes of "user login", "entering hot list topics", and "leaving a message in the topic area" in sequence, then the behavioral characteristics corresponding to daily business request B are behavioral characteristics b.
内容特征,即发送的日常业务请求中的内容的特征,例如特定关键字、以及包含特定关键字的语句,和/或,针对行为特征的行为内容,例如日常业务请求用于触发“添加好友”的业务节点,对应的内容特征即待添加好友的账户标识。内容特征可以通过日常业务请求中的具体内容信息确定。Content characteristics, that is, characteristics of the content in the daily business requests sent, such as specific keywords and statements containing specific keywords, and/or behavioral content for behavioral characteristics, such as daily business requests used to trigger "add friends" Business node, the corresponding content feature is the account ID of the friend to be added. Content characteristics can be determined through specific content information in daily business requests.
进一步地,多维度特征是指上述四种特征中的至少两种特征的结合,更具体地,多维度特征可以包括每一类特征(账户特征,设备特征、行为特征、内容特征)中的多个子类,从而得到更多维度的组合,例如多维度特征可以包括500个维度的特征,从而实现对业务请求更加精准的描述。Further, multi-dimensional features refer to the combination of at least two of the above four features. More specifically, multi-dimensional features can include multiple features of each type (account features, device features, behavioral features, content features). Subcategory, thereby obtaining more dimensional combinations. For example, multi-dimensional features can include 500-dimensional features, thereby achieving a more accurate description of business requests.
步骤S203:根据多维度特征,对日常业务请求对应的账户进行聚类,得到多个聚类账户,聚类账户为具有相同聚类特征的多个账户的集合,其中,聚类特征为多维度特征的子集。Step S203: Cluster accounts corresponding to daily business requests according to multi-dimensional features to obtain multiple clustered accounts. A clustered account is a set of multiple accounts with the same clustering features, where the clustering feature is multi-dimensional. subset of features.
步骤S204:根据各聚类账户中的账户的数量,确定目标聚类账户,目标聚类账户中的账户为目标账户。Step S204: Determine the target cluster account according to the number of accounts in each cluster account, and the account in the target cluster account is the target account.
示例性地,多维度特征,相当于是日常业务请求的描述信息,维度数量越多,则该描述信息越准确。具体地,对于正常账户发送的日常业务请求,由于不同用户使用互联网平台的方式和目的存在差异,因此,其发出的日常业务请求在多个维度上的特征,是存在随机性的, 也因此,对于正常账户发出的日常业务请求,通常不会集中在同一个多维度特征下。而对于攻击方使用脚本程序注册的非法账户(目标账户),其发出的非法请求,是基于程序脚本驱动的,因此,会在某些维度构成的多维度特征下,形成高度的聚集性,例如,同一时间登录(设备特征)、具有共同的好友(账户特征)、具有相同的业务节点触发顺序(行为特征)、留言内容相同(内容特征)。因此,基于日常业务请求对应的多维度特征,将多维度特征相同的日常业务请求对应的账户,进行聚类,得到聚类账户。之后,评估聚类账户的数量,当聚类账户的数量大于预设值时,则认定该聚类账户中的账户存在异常,存在发起非法请求的风险,即目标账户。For example, multi-dimensional features are equivalent to the description information of daily business requests. The greater the number of dimensions, the more accurate the description information. Specifically, for daily business requests sent by normal accounts, due to differences in the ways and purposes of different users using the Internet platform, the characteristics of the daily business requests sent by them in multiple dimensions are random. Therefore, daily business requests issued by normal accounts are usually not concentrated under the same multi-dimensional characteristics. For illegal accounts (target accounts) registered by attackers using script programs, the illegal requests issued are driven by program scripts. Therefore, they will form a high degree of aggregation under the multi-dimensional characteristics of certain dimensions, such as , log in at the same time (device characteristics), have common friends (account characteristics), have the same business node trigger sequence (behavior characteristics), and have the same message content (content characteristics). Therefore, based on the multi-dimensional characteristics corresponding to daily business requests, the accounts corresponding to daily business requests with the same multi-dimensional characteristics are clustered to obtain clustered accounts. Afterwards, the number of clustered accounts is evaluated. When the number of clustered accounts is greater than the preset value, it is determined that the account in the clustered account is abnormal and there is a risk of initiating illegal requests, that is, the target account.
本实施例中,通过检测日常业务请求,从多维度对日常业务请求进行综合判断,并根据日常业务请求的多维度特征的聚集度,精确的区分出由脚本程序生成的非法请求和由普通账户发出的正确业务请求,实现对目标账户的精确定位。避免了现有技术中基于专家经验判断目标账户的方案中,由于攻击方改变请求参数而导致的无法准确定位目标账户的问题,提高非法账户的检测准确性。In this embodiment, by detecting daily business requests, the daily business requests are comprehensively judged from multiple dimensions, and based on the aggregation of multi-dimensional features of daily business requests, illegal requests generated by script programs and those generated by ordinary accounts are accurately distinguished. Send the correct business request to achieve precise positioning of the target account. This method avoids the problem of being unable to accurately locate the target account due to the attacker changing the request parameters in the existing solution of judging the target account based on expert experience, and improves the detection accuracy of illegal accounts.
步骤S205:根据目标账户,确定对应的关键业务节点,关键业务节点为针对目标账户发起的非法请求进行访问拦截时,拦截效果最好的业务节点。Step S205: Determine the corresponding key business node according to the target account. The key business node is the business node with the best interception effect when intercepting illegal requests initiated by the target account.
步骤S206:获取申诉数据,申诉数据为目标账户发送的针对访问拦截的申诉信息。Step S206: Obtain appeal data, which is appeal information against access interception sent by the target account.
步骤S207:根据申诉数据,更新目标账户和/或拦截策略,并返回步骤S201,其中,拦截策略为对目标账户发送的业务请求进行访问拦截的策略。Step S207: Update the target account and/or interception policy according to the complaint data, and return to step S201, where the interception policy is a policy for access interception of service requests sent by the target account.
示例性地,在确定关键业务节点后,基于关键业务节点对目标账户进行访问拦截,实现对系统生态的保护。但同时,仍会可能存在部分误拦截请求,导致正常用户的业务请求被拦截,无法正常触发业务节点。之后,部分用户会针对该误拦截发起申诉请求,同时,攻击方也会基于目标账户,利用脚本程序,向服务器发送虚假的申诉请求。申诉数据,即针对目标账户向互联网平台提交的申诉信息的集合,服务器在获得申诉数据后,对申诉数据进行分析,可以确定其中由用户发送的,反映误拦截情况的真实申诉信息,也可以确定其中由利用脚本程序发送的虚假申诉信息。之后,通过真实申诉信息和虚假申诉信息,进一步的对提供拦截策略的处理模型进行训练,从而更新之前被确定为非法账户的目标账户,和/或,更新针对目标账户的拦截策略,其中,关于拦截策略的具体实现,可参见图6所示实施例中相关介绍,此处不再赘述。For example, after determining the key business nodes, access to the target account is intercepted based on the key business nodes to protect the system ecology. But at the same time, there may still be some mistakenly intercepted requests, resulting in normal users' business requests being intercepted and the business nodes unable to be triggered normally. Later, some users will initiate appeal requests for the mistaken interception. At the same time, the attacker will also use script programs to send false appeal requests to the server based on the target account. Complaint data is a collection of complaint information submitted to the Internet platform for the target account. After obtaining the complaint data, the server analyzes the complaint data and can determine the real complaint information sent by the user that reflects the mistaken interception. It can also determine False complaint information sent by a script program. After that, through the real complaint information and false complaint information, the processing model that provides the interception strategy is further trained to update the target account that was previously determined to be an illegal account, and/or update the interception strategy for the target account, where, about For the specific implementation of the interception strategy, please refer to the relevant introduction in the embodiment shown in Figure 6, and will not be described again here.
示例性地,如图9所示,步骤S207的具体实现步骤包括:For example, as shown in Figure 9, the specific implementation steps of step S207 include:
步骤S2071:根据申诉数据的内容进行聚类,获取第一申诉样本和第二申诉样本,其中,第一申诉样本为正常账户发送的申诉信息,第二申诉样本为具有向目标业务发起非法请求风险的账户。Step S2071: Cluster according to the content of the complaint data to obtain the first complaint sample and the second complaint sample. The first complaint sample is the complaint information sent by the normal account, and the second complaint sample is the risk of initiating illegal requests to the target business. account.
步骤S2072:根据第一申诉样本和/或第二申诉样本,更新目标账户和/或拦截策略。Step S2072: Update the target account and/or interception policy based on the first complaint sample and/or the second complaint sample.
示例性地,获得申诉数据后,根据申诉数据中每一申诉信息的内容,例如,申诉信息中包括“申诉原因说明”的内容项,针对“申诉原因说明”进行文本聚类,排除离群点并自动标记非离群点为有效申诉信息,即第一申诉样本,对于其他离群点,则标记为第二申诉样本。之后,对第一申诉样本对应的账户标记为白样本,基于白样本对提供拦截策略的处理模型进行训练,完成拦截策略的自动优化和迭代,提高拦截策略的准确性和合理性。 For example, after obtaining the complaint data, based on the content of each complaint information in the complaint data, for example, if the complaint information includes a content item of "Complaint Reason Description", perform text clustering on the "Complaint Reason Description" to exclude outliers. And automatically mark non-outlier points as valid appeal information, that is, the first appeal sample, and other outlier points are marked as the second appeal sample. After that, the account corresponding to the first complaint sample is marked as a white sample, and the processing model that provides the interception strategy is trained based on the white sample to complete the automatic optimization and iteration of the interception strategy and improve the accuracy and rationality of the interception strategy.
本实施例中,步骤S205的实现方式与本公开图2所示实施例中的步骤S102的实现方式相同,在此不再一一赘述。In this embodiment, the implementation of step S205 is the same as the implementation of step S102 in the embodiment shown in FIG. 2 of the present disclosure, and will not be described again one by one.
对应于上文实施例的业务请求处理方法,图10为本公开实施例提供的业务请求处理装置的结构框图。为了便于说明,仅示出了与本公开实施例相关的部分。参照图10,业务请求处理装置3,包括:Corresponding to the service request processing method in the above embodiment, FIG. 10 is a structural block diagram of a service request processing device provided by an embodiment of the present disclosure. For convenience of explanation, only parts related to the embodiments of the present disclosure are shown. Referring to Figure 10, service request processing device 3 includes:
获取模块31,用于获取目标账户,目标账户为具有向目标业务发起非法请求风险的账户,目标业务具有至少两个业务节点;The acquisition module 31 is used to obtain a target account. The target account is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
确定模块32,用于根据目标账户,确定对应的关键业务节点,关键业务节点为针对目标账户发起的非法请求进行访问拦截时,拦截效果最好的业务节点;The determination module 32 is used to determine the corresponding key business node according to the target account. The key business node is the business node with the best interception effect when access interception of illegal requests initiated by the target account;
拦截模块33,用于基于关键业务节点,对目标账户发送的业务请求进行访问拦截。The interception module 33 is used to access and intercept business requests sent by the target account based on key business nodes.
在本公开的一个实施例中,确定模块32,具体用于:获取目标账户发送的第一业务请求;根据第一业务请求,确定各业务节点对应的拦截收益,拦截收益表征基于单位计算资源,在对应的业务节点对目标账户归属的攻击方进行拦截的有效拦截时长;根据拦截收益,确定关键业务节点。In one embodiment of the present disclosure, the determination module 32 is specifically configured to: obtain the first service request sent by the target account; determine the interception revenue corresponding to each service node according to the first service request, and the interception revenue representation is based on unit computing resources, The effective interception duration for intercepting the attacker belonging to the target account at the corresponding business node; determine the key business nodes based on the interception revenue.
在本公开的一个实施例中,确定模块32在根据第一业务请求,确定各业务节点对应的拦截收益时,具体用于:基于预设的单位计算资源,针对目标账户发送的第一业务请求,分别在不同业务节点进行访问拦截,并记录各业务节点对应的第一时刻,第一时刻为访问拦截的开始时刻;检测目标账户发送的针对不同业务节点第二业务请求,并记录第二业务请求对应的第二时刻,其中,第二业务请求为绕过访问拦截的业务请求,第二时刻为接收到第二业务请求的时刻;根据第一时刻和第二时刻,确定各业务节点对应的拦截收益。In one embodiment of the present disclosure, when determining the interception revenue corresponding to each business node according to the first business request, the determination module 32 is specifically used to: based on the preset unit computing resources, target the first business request sent by the target account. , conduct access interception at different business nodes, and record the first moment corresponding to each business node. The first moment is the start time of access interception; detect the second business request for different business nodes sent by the target account, and record the second business The second moment corresponding to the request, where the second service request is a service request that bypasses access interception, and the second moment is the moment when the second service request is received; according to the first moment and the second moment, determine the corresponding service node of each service node. Interception earnings.
在本公开的一个实施例中,拦截模块33,具体用于:基于关键业务节点,确定拦截策略,拦截策略表征预设的总计算资源在各业务节点的计算资源分配;根据拦截策略,在关键业务节点和至少一个其他业务节点对目标账户发送的业务请求进行拦截。In one embodiment of the present disclosure, the interception module 33 is specifically used to: determine an interception strategy based on key business nodes. The interception strategy represents the preset total computing resource allocation in each business node; according to the interception strategy, on the key business nodes The business node and at least one other business node intercept the business request sent by the target account.
在本公开的一个实施例中,获取模块31,具体用于:根据日常业务请求的多维度特征,识别目标账户。In one embodiment of the present disclosure, the acquisition module 31 is specifically configured to identify the target account based on the multi-dimensional characteristics of daily business requests.
在本公开的一个实施例中,获取模块31在根据日常业务请求的多维度特征,识别目标账户时,具体用于:获取日常业务请求的多维度特征;根据多维度特征,对日常业务请求对应的账户进行聚类,得到多个聚类账户,聚类账户为具有相同聚类特征的多个账户的集合,其中,聚类特征为多维度特征的子集;根据各聚类账户中的账户的数量,确定目标聚类账户,目标聚类账户中的账户为目标账户。In one embodiment of the present disclosure, when the acquisition module 31 identifies the target account according to the multi-dimensional characteristics of the daily business request, it is specifically used to: obtain the multi-dimensional characteristics of the daily business request; according to the multi-dimensional characteristics, correspond to the daily business request. Accounts are clustered to obtain multiple clustered accounts. A clustered account is a set of multiple accounts with the same clustering characteristics, where the clustering characteristics are a subset of multi-dimensional characteristics; according to the accounts in each clustered account number, determine the target cluster account, and the account in the target cluster account is the target account.
在本公开的一个实施例中,多维度特征包括以下至少两类:账户特征,设备特征、行为特征、内容特征。In one embodiment of the present disclosure, multi-dimensional features include at least two of the following categories: account features, device features, behavior features, and content features.
在本公开的一个实施例中,获取模块31,还用于:获取申诉数据,申诉数据为目标账户发送的针对访问拦截的申诉信息;根据申诉数据,更新目标账户和/或拦截策略,其中,拦截策略为对目标账户发送的业务请求进行访问拦截的策略。In one embodiment of the present disclosure, the acquisition module 31 is also used to: obtain appeal data, which is appeal information for access interception sent by the target account; update the target account and/or interception policy according to the appeal data, wherein, The interception policy is a policy for access interception of business requests sent by the target account.
在本公开的一个实施例中,获取模块31在根据申诉数据,更新目标账户和/或拦截策略时,具体用于:根据申诉数据的内容进行聚类,获取第一申诉样本和第二申诉样本,其中,第一申诉样本为正常账户发送的申诉信息,第二申诉样本为具有向目标业务发起非法请求风险的 账户;根据第一申诉样本和/或第二申诉样本,更新目标账户和/或拦截策略。In one embodiment of the present disclosure, when updating the target account and/or interception strategy according to the complaint data, the acquisition module 31 is specifically used to: perform clustering according to the content of the complaint data, and obtain the first complaint sample and the second complaint sample. , among which, the first complaint sample is the complaint information sent by the normal account, and the second complaint sample is the risk of initiating illegal requests to the target business. Account; update the target account and/or interception policy based on the first complaint sample and/or the second complaint sample.
其中,获取模块31、确定模块32、拦截模块33依次连接。本实施例提供的业务请求处理装置3可以执行上述方法实施例的技术方案,其实现原理和技术效果类似,本实施例此处不再赘述。Among them, the acquisition module 31, the determination module 32, and the interception module 33 are connected in sequence. The service request processing device 3 provided in this embodiment can execute the technical solution of the above method embodiment. Its implementation principles and technical effects are similar, and will not be described again in this embodiment.
图11为本公开实施例提供的一种电子设备的结构示意图,如图11所示,该电子设备3包括:Figure 11 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure. As shown in Figure 11, the electronic device 3 includes:
处理器41,以及与处理器41通信连接的存储器42;Processor 41, and memory 42 communicatively connected to processor 41;
存储器42存储计算机执行指令;Memory 42 stores computer execution instructions;
处理器41执行存储器42存储的计算机执行指令,以实现如图2-图9所示实施例中的业务请求处理方法。The processor 41 executes the computer execution instructions stored in the memory 42 to implement the service request processing method in the embodiment shown in Figures 2 to 9.
其中,可选地,处理器41和存储器42通过总线43连接。Wherein, optionally, the processor 41 and the memory 42 are connected through the bus 43 .
相关说明可以对应参见图2-图9所对应的实施例中的步骤所对应的相关描述和效果进行理解,此处不做过多赘述。Relevant descriptions can be understood by referring to the relevant descriptions and effects corresponding to the steps in the embodiments corresponding to Figures 2 to 9, and will not be described again here.
参考图12,其示出了适于用来实现本公开实施例的电子设备900的结构示意图,该电子设备900可以为终端设备或服务器。其中,终端设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、个人数字助理(Personal Digital Assistant,PDA)、平板电脑(Portable Android Device,PAD)、便携式多媒体播放器(Portable Media Player,PMP)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字电视(Television,TV)、台式计算机等等的固定终端。图12示出的电子设备仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。Referring to FIG. 12 , a schematic structural diagram of an electronic device 900 suitable for implementing an embodiment of the present disclosure is shown. The electronic device 900 may be a terminal device or a server. Among them, terminal devices may include but are not limited to mobile phones, notebook computers, digital broadcast receivers, personal digital assistants (Personal Digital Assistant, PDA), tablet computers (Portable Android Device, PAD), portable multimedia players (Portable Media Player , PMP), mobile terminals such as vehicle-mounted terminals (such as vehicle-mounted navigation terminals), and fixed terminals such as digital televisions (Television, TV), desktop computers, etc. The electronic device shown in FIG. 12 is only an example and should not impose any limitations on the functions and scope of use of the embodiments of the present disclosure.
如图12所示,电子设备900可以包括处理装置(例如中央处理器、图形处理器等)901,其可以根据存储在只读存储器(Read Only Memory,ROM)902中的程序或者从存储装置908加载到随机访问存储器(Random Access Memory,RAM)903中的程序而执行各种适当的动作和处理。在RAM 903中,还存储有电子设备900操作所需的各种程序和数据。处理装置901、ROM 902以及RAM 903通过总线904彼此相连。输入/输出(Input/Output,I/O)接口905也连接至总线904。As shown in Figure 12, the electronic device 900 may include a processing device (such as a central processing unit, a graphics processor, etc.) 901, which may process data according to a program stored in a read-only memory (Read Only Memory, ROM) 902 or from a storage device 908 The program loaded into the random access memory (Random Access Memory, RAM) 903 performs various appropriate actions and processing. In the RAM 903, various programs and data required for the operation of the electronic device 900 are also stored. The processing device 901, ROM 902 and RAM 903 are connected to each other via a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
通常,以下装置可以连接至I/O接口905:包括例如触摸屏、触摸板、键盘、鼠标、摄像头、麦克风、加速度计、陀螺仪等的输入装置906;包括例如液晶显示器(Liquid Crystal Display,LCD)、扬声器、振动器等的输出装置907;包括例如磁带、硬盘等的存储装置908;以及通信装置909。通信装置909可以允许电子设备900与其他设备进行无线或有线通信以交换数据。虽然图12示出了具有各种装置的电子设备900,但是应理解的是,并不要求实施或具备所有示出的装置。可以替代地实施或具备更多或更少的装置。Generally, the following devices can be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; including, for example, a Liquid Crystal Display (LCD) , an output device 907 such as a speaker, a vibrator, etc.; a storage device 908 including a magnetic tape, a hard disk, etc.; and a communication device 909. The communication device 909 may allow the electronic device 900 to communicate wirelessly or wiredly with other devices to exchange data. Although FIG. 12 illustrates electronic device 900 with various means, it should be understood that implementation or availability of all illustrated means is not required. More or fewer means may alternatively be implemented or provided.
特别地,根据本公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置909从网络上被下载和安装,或者从存储装置908被安装,或者从ROM 902被安装。在该计算机程序被处理装置901执行时,执行本公开实施例的方法中限定的上述功能。 In particular, according to embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable medium, the computer program containing program code for performing the method illustrated in the flowchart. In such embodiments, the computer program may be downloaded and installed from the network via communication device 909, or from storage device 908, or from ROM 902. When the computer program is executed by the processing device 901, the above-mentioned functions defined in the method of the embodiment of the present disclosure are performed.
需要说明的是,本公开上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)或闪存、光纤、便携式紧凑磁盘只读存储器(Compact Disc Read Only Memory,CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、射频(Radio Frequency,RF)等等,或者上述的任意合适的组合。It should be noted that the computer-readable medium mentioned above in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the above two. The computer-readable storage medium may be, for example, but is not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or any combination thereof. More specific examples of computer readable storage media may include, but are not limited to: an electrical connection having one or more conductors, a portable computer disk, a hard drive, random access memory (RAM), read only memory (ROM), erasable Programmable Read Only Memory (Erasable Programmable Read Only Memory, EPROM) or flash memory, optical fiber, portable compact disk read only memory (Compact Disc Read Only Memory, CD-ROM), optical storage device, magnetic storage device, or any of the above suitable combination. In this disclosure, a computer-readable storage medium may be any tangible medium that contains or stores a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, carrying computer-readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. A computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium that can send, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device . Program code contained on a computer-readable medium can be transmitted using any appropriate medium, including but not limited to: wires, optical cables, radio frequency (Radio Frequency, RF), etc., or any suitable combination of the above.
上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。The above-mentioned computer-readable medium may be included in the above-mentioned electronic device; it may also exist independently without being assembled into the electronic device.
上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备执行上述实施例所示的方法。The computer-readable medium carries one or more programs. When the one or more programs are executed by the electronic device, the electronic device performs the method shown in the above embodiment.
可以以一种或多种程序设计语言或其组合来编写用于执行本公开的操作的计算机程序代码,上述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(Local Area Network,LAN)或广域网(Wide Area Network,WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。Computer program code for performing the operations of the present disclosure may be written in one or more programming languages, including object-oriented programming languages such as Java, Smalltalk, C++, and conventional Procedural programming language—such as "C" or a similar programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In situations involving remote computers, the remote computer can be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or it can be connected to an external computer ( For example, using an Internet service provider to connect via the Internet).
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operations of possible implementations of systems, methods, and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagram may represent a module, segment, or portion of code that contains one or more logic functions that implement the specified executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown one after another may actually execute substantially in parallel, or they may sometimes execute in the reverse order, depending on the functionality involved. It will also be noted that each block of the block diagram and/or flowchart illustration, and combinations of blocks in the block diagram and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or operations. , or can be implemented using a combination of specialized hardware and computer instructions.
描述于本公开实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,单元的名称在某种情况下并不构成对该单元本身的限定,例如,第一获取 单元还可以被描述为“获取至少两个网际协议地址的单元”。The units involved in the embodiments of the present disclosure can be implemented in software or hardware. Among them, the name of the unit does not constitute a limitation on the unit itself under certain circumstances. For example, the first acquisition A unit may also be described as "a unit that obtains at least two Internet Protocol addresses."
本文中以上描述的功能可以至少部分地由一个或多个硬件逻辑部件来执行。例如,非限制性地,可以使用的示范类型的硬件逻辑部件包括:现场可编程门阵列(Field-Programmable Gate Array,FPGA)、专用集成电路(Application Specific Integrated Circuit,ASIC)、专用标准产品(Application Specific Standard Parts,ASSP)、片上系统(System On Chip,SOC)、复杂可编程逻辑设备(Complex Programmable Logic Device,CPLD)等等。The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that can be used include: Field-Programmable Gate Array (FPGA), Application Specific Integrated Circuit (Application Specific Integrated Circuit, ASIC), Application Specification Standard Product (Application Specification) Specific Standard Parts (ASSP), System On Chip (SOC), Complex Programmable Logic Device (CPLD), etc.
在本公开的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例可以包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。In the context of this disclosure, a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or devices, or any suitable combination of the foregoing. More specific examples of machine-readable storage media may include an electrical connection based on one or more wires, a portable computer disk, a hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
第一方面,根据本公开的一个或多个实施例,提供了一种业务请求处理方法,包括:In a first aspect, according to one or more embodiments of the present disclosure, a service request processing method is provided, including:
获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。Obtain a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes; determine the corresponding key business node according to the target account, and the key business node is When performing access interception on illegal requests initiated by the target account, the service node with the best interception effect among the at least two service nodes shall perform access interception on the service request sent by the target account based on the key business node.
根据本公开的一个或多个实施例,根据所述目标账户,确定对应的关键业务节点,包括:获取所述目标账户发送的第一业务请求;根据所述第一业务请求,确定各所述业务节点对应的拦截收益,所述拦截收益表征基于单位计算资源,在对应的业务节点对所述目标账户归属的攻击方进行拦截的有效拦截时长;根据所述拦截收益,确定所述关键业务节点。According to one or more embodiments of the present disclosure, determining the corresponding key business node according to the target account includes: obtaining the first business request sent by the target account; determining each of the key business nodes according to the first business request. The interception revenue corresponding to the business node, the interception revenue represents the effective interception time for intercepting the attacker belonging to the target account at the corresponding business node based on the unit computing resources; according to the interception revenue, the key business node is determined .
根据本公开的一个或多个实施例,根据所述第一业务请求,确定各所述业务节点对应的拦截收益,包括:基于预设的单位计算资源,针对所述目标账户发送的第一业务请求,分别在不同业务节点进行访问拦截,并记录各所述业务节点对应的第一时刻,所述第一时刻为所述访问拦截的开始时刻;检测所述目标账户发送的针对所述不同业务节点第二业务请求,并记录所述第二业务请求对应的第二时刻,其中,所述第二业务请求为绕过所述访问拦截的业务请求,所述第二时刻为接收到所述第二业务请求的时刻;根据所述第一时刻和所述第二时刻,确定各所述业务节点对应的拦截收益。According to one or more embodiments of the present disclosure, determining the interception revenue corresponding to each of the service nodes according to the first service request includes: based on preset unit computing resources, for the first service sent by the target account Request, conduct access interception at different business nodes, and record the first moment corresponding to each business node, the first moment being the start time of the access interception; detect the message sent by the target account for the different services The node makes a second service request, and records the second moment corresponding to the second service request, where the second service request is a service request that bypasses the access interception, and the second moment is when the first service request is received. 2. The time of the service request; based on the first time and the second time, determine the interception revenue corresponding to each of the service nodes.
根据本公开的一个或多个实施例,基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截,包括:基于所述关键业务节点,确定拦截策略,所述拦截策略表征预设的总计算资源在各所述业务节点的计算资源分配;根据所述拦截策略,在所述关键业务节点和至少一个其他业务节点对所述目标账户发送的业务请求进行拦截。According to one or more embodiments of the present disclosure, performing access interception on the service request sent by the target account based on the key business node includes: determining an interception strategy based on the key business node, and the interception strategy represents a preset The total computing resources are allocated to each of the business nodes; according to the interception policy, the business request sent by the target account is intercepted at the key business node and at least one other business node.
根据本公开的一个或多个实施例,所述获取目标账户,包括:根据日常业务请求的多维度特征,识别所述目标账户。According to one or more embodiments of the present disclosure, obtaining the target account includes: identifying the target account based on multi-dimensional characteristics of daily business requests.
根据本公开的一个或多个实施例,根据所述日常业务请求的多维度特征,识别目标账户,包括:获取所述日常业务请求的多维度特征;根据所述多维度特征,对所述日常业务请求对 应的账户进行聚类,得到多个聚类账户,所述聚类账户为具有相同聚类特征的多个账户的集合,其中,所述聚类特征为所述多维度特征的子集;根据各所述聚类账户中的账户的数量,确定目标聚类账户,所述目标聚类账户中的账户为所述目标账户。According to one or more embodiments of the present disclosure, identifying the target account according to the multi-dimensional characteristics of the daily business request includes: obtaining the multi-dimensional characteristics of the daily business request; and applying the multi-dimensional characteristics to the daily business request according to the multi-dimensional characteristics. business request pair According to The number of accounts in each clustered account determines the target clustered account, and the account in the target clustered account is the target account.
根据本公开的一个或多个实施例,所述多维度特征包括以下至少两类:账户特征,设备特征、行为特征、内容特征。According to one or more embodiments of the present disclosure, the multi-dimensional features include at least two of the following categories: account features, device features, behavior features, and content features.
根据本公开的一个或多个实施例,所述方法还包括:获取申诉数据,所述申诉数据为所述目标账户发送的针对所述访问拦截的申诉信息;根据所述申诉数据,更新所述目标账户和/或拦截策略,其中,所述拦截策略为对目标账户发送的业务请求进行访问拦截的策略。According to one or more embodiments of the present disclosure, the method further includes: obtaining appeal data, which is appeal information sent by the target account against the access interception; and updating the appeal data according to the appeal data. Target account and/or interception policy, wherein the interception policy is a policy for access interception of service requests sent by the target account.
根据本公开的一个或多个实施例,根据所述申诉数据,更新所述目标账户和/或拦截策略,包括:根据所述申诉数据的内容进行聚类,获取第一申诉样本和第二申诉样本,其中,所述第一申诉样本为正常账户发送的申诉信息,所述第二申诉样本为具有向目标业务发起非法请求风险的账户;根据所述第一申诉样本和/或所述第二申诉样本,更新所述目标账户和/或拦截策略。According to one or more embodiments of the present disclosure, updating the target account and/or interception strategy according to the complaint data includes: clustering according to the content of the complaint data, and obtaining a first complaint sample and a second complaint Samples, wherein the first appeal sample is appeal information sent by a normal account, and the second appeal sample is an account with the risk of initiating illegal requests to the target business; according to the first appeal sample and/or the second appeal sample Appeal sample, update the targeted account and/or blocking policy.
第二方面,根据本公开的一个或多个实施例,提供了一种业务请求处理装置,包括:In a second aspect, according to one or more embodiments of the present disclosure, a service request processing device is provided, including:
获取模块,用于获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;An acquisition module, configured to acquire a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
确定模块,用于根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;Determination module, configured to determine the corresponding key business node according to the target account. When the key business node performs access interception for illegal requests initiated by the target account, the interception effect is the best among the at least two business nodes. business nodes;
拦截模块,用于基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。The interception module is used to access and intercept business requests sent by the target account based on the key business nodes.
根据本公开的一个或多个实施例,所述确定模块,具体用于:获取所述目标账户发送的第一业务请求;根据所述第一业务请求,确定各所述业务节点对应的拦截收益,所述拦截收益表征基于单位计算资源,在对应的业务节点对所述目标账户归属的攻击方进行拦截的有效拦截时长;根据所述拦截收益,确定所述关键业务节点。According to one or more embodiments of the present disclosure, the determination module is specifically configured to: obtain the first service request sent by the target account; and determine the interception revenue corresponding to each of the service nodes according to the first service request. , the interception revenue represents the effective interception time of intercepting the attacker belonging to the target account at the corresponding business node based on the unit computing resources; the key business node is determined based on the interception revenue.
根据本公开的一个或多个实施例,所述确定模块在根据所述第一业务请求,确定各所述业务节点对应的拦截收益时,具体用于:基于预设的单位计算资源,针对所述目标账户发送的第一业务请求,分别在不同业务节点进行访问拦截,并记录各所述业务节点对应的第一时刻,所述第一时刻为所述访问拦截的开始时刻;检测所述目标账户发送的针对所述不同业务节点第二业务请求,并记录所述第二业务请求对应的第二时刻,其中,所述第二业务请求为绕过所述访问拦截的业务请求,所述第二时刻为接收到所述第二业务请求的时刻;根据所述第一时刻和所述第二时刻,确定各所述业务节点对应的拦截收益。According to one or more embodiments of the present disclosure, when determining the interception revenue corresponding to each of the service nodes according to the first service request, the determination module is specifically configured to: based on the preset unit computing resources, for all The first business request sent by the target account is accessed and intercepted at different business nodes, and the first time corresponding to each of the business nodes is recorded, and the first time is the start time of the access interception; detecting the target The account sends a second service request for the different service nodes, and records the second time corresponding to the second service request, where the second service request is a service request that bypasses the access interception, and the third The second time is the time when the second service request is received; based on the first time and the second time, the interception revenue corresponding to each of the service nodes is determined.
根据本公开的一个或多个实施例,所述拦截模块,具体用于:基于所述关键业务节点,确定拦截策略,所述拦截策略表征预设的总计算资源在各所述业务节点的计算资源分配;根据所述拦截策略,在所述关键业务节点和至少一个其他业务节点对所述目标账户发送的业务请求进行拦截。According to one or more embodiments of the present disclosure, the interception module is specifically configured to: determine an interception strategy based on the key business nodes, and the interception strategy represents the calculation of the preset total computing resources in each of the business nodes. Resource allocation: According to the interception policy, the business request sent by the target account is intercepted at the key business node and at least one other business node.
根据本公开的一个或多个实施例,所述获取模块,具体用于:检测日常业务请求;根据所述日常业务请求的多维度特征,识别所述目标账户。According to one or more embodiments of the present disclosure, the acquisition module is specifically configured to: detect daily business requests; and identify the target account according to the multi-dimensional characteristics of the daily business requests.
根据本公开的一个或多个实施例,所述获取模块在根据所述日常业务请求的多维度特征, 识别目标账户时,具体用于:获取所述日常业务请求的多维度特征;根据所述多维度特征,对所述日常业务请求对应的账户进行聚类,得到多个聚类账户,所述聚类账户为具有相同聚类特征的多个账户的集合,其中,所述聚类特征为所述多维度特征的子集;根据各所述聚类账户中的账户的数量,确定目标聚类账户,所述目标聚类账户中的账户为所述目标账户。According to one or more embodiments of the present disclosure, the acquisition module is based on the multi-dimensional characteristics of the daily business request, When identifying the target account, it is specifically used to: obtain the multi-dimensional characteristics of the daily business request; cluster the accounts corresponding to the daily business request according to the multi-dimensional characteristics to obtain multiple clustered accounts. A class account is a set of multiple accounts with the same clustering characteristics, where the clustering characteristics are a subset of the multi-dimensional characteristics; the target clustered account is determined according to the number of accounts in each clustered account. , the account in the target clustered account is the target account.
根据本公开的一个或多个实施例,所述多维度特征包括以下至少两类:账户特征,设备特征、行为特征、内容特征。According to one or more embodiments of the present disclosure, the multi-dimensional features include at least two of the following categories: account features, device features, behavior features, and content features.
根据本公开的一个或多个实施例,所述获取模块,还用于:获取申诉数据,所述申诉数据为所述目标账户发送的针对所述访问拦截的申诉信息;根据所述申诉数据,更新所述目标账户和/或拦截策略,其中,所述拦截策略为对目标账户发送的业务请求进行访问拦截的策略。According to one or more embodiments of the present disclosure, the acquisition module is further configured to: obtain appeal data, which is appeal information sent by the target account against the access interception; according to the appeal data, Update the target account and/or interception policy, where the interception policy is a policy for access interception of service requests sent by the target account.
根据本公开的一个或多个实施例,所述获取模块在根据所述申诉数据,更新所述目标账户和/或拦截策略时,具体用于:根据所述申诉数据的内容进行聚类,获取第一申诉样本和第二申诉样本,其中,所述第一申诉样本为正常账户发送的申诉信息,所述第二申诉样本为具有向目标业务发起非法请求风险的账户;根据所述第一申诉样本和/或所述第二申诉样本,更新所述目标账户和/或拦截策略。According to one or more embodiments of the present disclosure, when updating the target account and/or interception policy according to the complaint data, the acquisition module is specifically configured to: perform clustering according to the content of the complaint data, and obtain A first appeal sample and a second appeal sample, wherein the first appeal sample is appeal information sent by a normal account, and the second appeal sample is an account with the risk of initiating illegal requests to the target business; according to the first appeal sample and/or the second appeal sample, and update the target account and/or blocking policy.
第三方面,根据本公开的一个或多个实施例,提供了一种电子设备,包括:处理器,以及与所述处理器通信连接的存储器;In a third aspect, according to one or more embodiments of the present disclosure, an electronic device is provided, including: a processor, and a memory communicatively connected to the processor;
所述存储器存储计算机执行指令;The memory stores computer execution instructions;
所述处理器执行所述存储器存储的计算机执行指令,以实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。The processor executes computer execution instructions stored in the memory to implement the service request processing method described in the first aspect and various possible designs of the first aspect.
第四方面,根据本公开的一个或多个实施例,提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,当处理器执行所述计算机执行指令时,实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。In a fourth aspect, according to one or more embodiments of the present disclosure, a computer-readable storage medium is provided. Computer-executable instructions are stored in the computer-readable storage medium. When a processor executes the computer-executed instructions, Implement the service request processing method described in the first aspect and various possible designs of the first aspect.
第五方面,本公开实施例提供一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。In a fifth aspect, embodiments of the present disclosure provide a computer program product, including a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
第六方面,本公开实施例提供一种计算机程序,该计算机程序被处理器执行时实现如上第一方面以及第一方面各种可能的设计所述的业务请求处理方法。In a sixth aspect, embodiments of the present disclosure provide a computer program that, when executed by a processor, implements the service request processing method described in the first aspect and various possible designs of the first aspect.
以上描述仅为本公开的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本公开中所涉及的公开范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述公开构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本公开中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。The above description is only a description of the preferred embodiments of the present disclosure and the technical principles applied. Those skilled in the art should understand that the disclosure scope involved in the present disclosure is not limited to technical solutions composed of specific combinations of the above technical features, but should also cover solutions composed of the above technical features or without departing from the above disclosed concept. Other technical solutions formed by any combination of equivalent features. For example, a technical solution is formed by replacing the above features with technical features with similar functions disclosed in this disclosure (but not limited to).
此外,虽然采用特定次序描绘了各操作,但是这不应当理解为要求这些操作以所示出的特定次序或以顺序次序执行。在一定环境下,多任务和并行处理可能是有利的。同样地,虽然在上面论述中包含了若干具体实现细节,但是这些不应当被解释为对本公开的范围的限制。在单独的实施例的上下文中描述的某些特征还可以组合地实现在单个实施例中。相反地,在单个实施例的上下文中描述的各种特征也可以单独地或以任何合适的子组合的方式实现在多个实施例中。Furthermore, although operations are depicted in a specific order, this should not be understood as requiring that the operations be performed in the specific order shown, or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, although several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the present disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
尽管已经采用特定于结构特征和/或方法逻辑动作的语言描述了本主题,但是应当理解所 附权利要求书中所限定的主题未必局限于上面描述的特定特征或动作。相反,上面所描述的特定特征和动作仅仅是实现权利要求书的示例形式。 Although the subject matter has been described in language specific to structural features and/or logical acts of methods, it should be understood that all The subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are merely example forms of implementing the claims.

Claims (14)

  1. 一种业务请求处理方法,包括:A business request processing method, including:
    获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;Obtain a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
    根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;Determine the corresponding key business node according to the target account, and the key business node is the business node with the best interception effect among the at least two business nodes when access interception is performed for illegal requests initiated by the target account;
    基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。Based on the key business node, access interception is performed on the business request sent by the target account.
  2. 根据权利要求1所述的方法,其中,根据所述目标账户,确定对应的关键业务节点,包括:The method according to claim 1, wherein determining the corresponding key business node according to the target account includes:
    获取所述目标账户发送的第一业务请求;Obtain the first service request sent by the target account;
    根据所述第一业务请求,确定各所述业务节点对应的拦截收益,所述拦截收益表征基于单位计算资源,在对应的业务节点对所述目标账户归属的攻击方进行拦截的有效拦截时长;According to the first business request, determine the interception revenue corresponding to each of the business nodes. The interception revenue represents the effective interception time for intercepting the attacker belonging to the target account at the corresponding business node based on the unit's computing resources;
    根据所述拦截收益,确定所述关键业务节点。The key business node is determined based on the interception revenue.
  3. 根据权利要求2所述的方法,其中,根据所述第一业务请求,确定各所述业务节点对应的拦截收益,包括:The method according to claim 2, wherein determining the interception revenue corresponding to each of the service nodes according to the first service request includes:
    基于预设的单位计算资源,针对所述目标账户发送的第一业务请求,分别在不同业务节点进行访问拦截,并记录各所述业务节点对应的第一时刻,所述第一时刻为所述访问拦截的开始时刻;Based on the preset unit computing resources, for the first business request sent by the target account, access interception is performed at different business nodes, and the first time corresponding to each business node is recorded, and the first time is the The start time of access interception;
    检测所述目标账户发送的针对所述不同业务节点第二业务请求,并记录所述第二业务请求对应的第二时刻,其中,所述第二业务请求为绕过所述访问拦截的业务请求,所述第二时刻为接收到所述第二业务请求的时刻;Detect the second service request sent by the target account for the different service node, and record the second time corresponding to the second service request, wherein the second service request is a service request that bypasses the access interception , the second time is the time when the second service request is received;
    根据所述第一时刻和所述第二时刻,确定各所述业务节点对应的拦截收益。According to the first time and the second time, the interception revenue corresponding to each of the service nodes is determined.
  4. 根据权利要求1至3中任一项所述的方法,其中,基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截,包括:The method according to any one of claims 1 to 3, wherein based on the key business node, access interception of business requests sent by the target account includes:
    基于所述关键业务节点,确定拦截策略,所述拦截策略表征预设的总计算资源在各所述业务节点的计算资源分配;Based on the key business nodes, determine an interception strategy, where the interception strategy represents the allocation of computing resources of the preset total computing resources in each of the business nodes;
    根据所述拦截策略,在所述关键业务节点和至少一个其他业务节点对所述目标账户发送的业务请求进行拦截。According to the interception policy, the service request sent by the target account is intercepted at the key service node and at least one other service node.
  5. 根据权利要求1至4中任一项所述的方法,其中,所述获取目标账户,包括:The method according to any one of claims 1 to 4, wherein said obtaining the target account includes:
    根据日常业务请求的多维度特征,识别所述目标账户。The target account is identified based on the multi-dimensional characteristics of daily business requests.
  6. 根据权利要求5所述的方法,其中,根据所述日常业务请求的多维度特征,识别目标账户,包括:The method according to claim 5, wherein identifying the target account according to the multi-dimensional characteristics of the daily business request includes:
    获取所述日常业务请求的多维度特征;Obtain the multi-dimensional characteristics of the daily business requests;
    根据所述多维度特征,对所述日常业务请求对应的账户进行聚类,得到多个聚类账户,所述聚类账户为具有相同聚类特征的多个账户的集合,其中,所述聚类特征为所述多维度特征的子集;According to the multi-dimensional characteristics, the accounts corresponding to the daily business requests are clustered to obtain multiple clustered accounts. The clustered accounts are a set of multiple accounts with the same clustering characteristics, wherein the clustered accounts Class features are a subset of the multi-dimensional features;
    根据各所述聚类账户中的账户的数量,确定目标聚类账户,所述目标聚类账户中的账户为所述目标账户。 According to the number of accounts in each clustered account, a target clustered account is determined, and the account in the target clustered account is the target account.
  7. 根据权利要求5或6所述的方法,其中,所述多维度特征包括以下至少两类:The method according to claim 5 or 6, wherein the multi-dimensional features include at least two of the following categories:
    账户特征,设备特征、行为特征、内容特征。Account characteristics, device characteristics, behavioral characteristics, and content characteristics.
  8. 根据权利要求1至7中任一项所述的方法,其中,所述方法还包括:The method according to any one of claims 1 to 7, wherein the method further comprises:
    获取申诉数据,所述申诉数据为所述目标账户发送的针对所述访问拦截的申诉信息;Obtain appeal data, which is appeal information sent by the target account against the access interception;
    根据所述申诉数据,更新所述目标账户和/或拦截策略,其中,所述拦截策略为对目标账户发送的业务请求进行访问拦截的策略。According to the appeal data, the target account and/or the interception policy are updated, wherein the interception policy is a policy for access interception of service requests sent by the target account.
  9. 根据权利要求8所述的方法,其中,根据所述申诉数据,更新所述目标账户和/或拦截策略,包括:The method of claim 8, wherein updating the target account and/or blocking policy based on the appeal data includes:
    根据所述申诉数据的内容进行聚类,获取第一申诉样本和第二申诉样本,其中,所述第一申诉样本为正常账户发送的申诉信息,所述第二申诉样本为具有向目标业务发起非法请求风险的账户;Clustering is performed based on the content of the appeal data to obtain a first appeal sample and a second appeal sample. The first appeal sample is appeal information sent by a normal account, and the second appeal sample is an appeal information sent to the target business. Accounts with illegal request risks;
    根据所述第一申诉样本和/或所述第二申诉样本,更新所述目标账户和/或拦截策略。Update the target account and/or interception policy according to the first complaint sample and/or the second complaint sample.
  10. 一种业务请求处理装置,包括:A service request processing device, including:
    获取模块,用于获取目标账户,所述目标账户为具有向目标业务发起非法请求风险的账户,所述目标业务具有至少两个业务节点;An acquisition module, configured to acquire a target account, which is an account with the risk of initiating illegal requests to the target business, and the target business has at least two business nodes;
    确定模块,用于根据所述目标账户,确定对应的关键业务节点,所述关键业务节点为针对所述目标账户发起的非法请求进行访问拦截时,所述至少两个业务节点中拦截效果最好的业务节点;Determination module, configured to determine the corresponding key business node according to the target account. When the key business node performs access interception for illegal requests initiated by the target account, the interception effect is the best among the at least two business nodes. business nodes;
    拦截模块,用于基于所述关键业务节点,对目标账户发送的业务请求进行访问拦截。The interception module is used to access and intercept business requests sent by the target account based on the key business nodes.
  11. 一种电子设备,包括:处理器,以及与所述处理器通信连接的存储器;An electronic device includes: a processor, and a memory communicatively connected to the processor;
    所述存储器存储计算机执行指令;The memory stores computer execution instructions;
    所述处理器执行所述存储器存储的计算机执行指令,以实现如权利要求1至9中任一项所述的业务请求处理方法。The processor executes the computer execution instructions stored in the memory to implement the service request processing method according to any one of claims 1 to 9.
  12. 一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,当处理器执行所述计算机执行指令时,实现如权利要求1至9中任一项所述的业务请求处理方法。A computer-readable storage medium in which computer-executable instructions are stored. When a processor executes the computer-executable instructions, the service request processing as described in any one of claims 1 to 9 is implemented. method.
  13. 一种计算机程序产品,包括计算机程序,该计算机程序被处理器执行时实现权利要求1至9中任一项所述的业务请求处理方法。A computer program product includes a computer program that implements the service request processing method described in any one of claims 1 to 9 when executed by a processor.
  14. 一种计算机程序,所述计算机程序用于实现如权利要求1至9中任一项所述的业务请求处理方法。 A computer program used to implement the service request processing method according to any one of claims 1 to 9.
PCT/CN2023/113405 2022-08-26 2023-08-16 Service request processing method and apparatus, and electronic device and storage medium WO2024041436A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211037837.4 2022-08-26
CN202211037837.4A CN117675242A (en) 2022-08-26 2022-08-26 Service request processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2024041436A1 true WO2024041436A1 (en) 2024-02-29

Family

ID=90012450

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/113405 WO2024041436A1 (en) 2022-08-26 2023-08-16 Service request processing method and apparatus, and electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN117675242A (en)
WO (1) WO2024041436A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106210057A (en) * 2016-07-13 2016-12-07 成都知道创宇信息技术有限公司 A kind of cloud security means of defence based on CDN
US10666620B1 (en) * 2012-11-30 2020-05-26 United Services Automobile Association (Usaa) Private network request forwarding
CN112270011A (en) * 2020-11-19 2021-01-26 北京炼石网络技术有限公司 Method, device and system for protecting service and data security of existing application system
CN113379422A (en) * 2021-08-12 2021-09-10 腾讯科技(深圳)有限公司 Data processing method and device based on intelligent contract and readable storage medium
CN114760121A (en) * 2022-03-31 2022-07-15 腾讯科技(深圳)有限公司 Method for controlling access frequency and access frequency control system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10666620B1 (en) * 2012-11-30 2020-05-26 United Services Automobile Association (Usaa) Private network request forwarding
CN106210057A (en) * 2016-07-13 2016-12-07 成都知道创宇信息技术有限公司 A kind of cloud security means of defence based on CDN
CN112270011A (en) * 2020-11-19 2021-01-26 北京炼石网络技术有限公司 Method, device and system for protecting service and data security of existing application system
CN113379422A (en) * 2021-08-12 2021-09-10 腾讯科技(深圳)有限公司 Data processing method and device based on intelligent contract and readable storage medium
CN114760121A (en) * 2022-03-31 2022-07-15 腾讯科技(深圳)有限公司 Method for controlling access frequency and access frequency control system

Also Published As

Publication number Publication date
CN117675242A (en) 2024-03-08

Similar Documents

Publication Publication Date Title
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
US10223524B1 (en) Compromised authentication information clearing house
US9838384B1 (en) Password-based fraud detection
US10958657B2 (en) Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems
US10176318B1 (en) Authentication information update based on fraud detection
US10887307B1 (en) Systems and methods for identifying users
US20160359900A1 (en) System for anonymously detecting and blocking threats within a telecommunications network
US10657971B1 (en) Systems and methods for detecting suspicious voice calls
JP2016503219A (en) System and method for cognitive behavior recognition
US11695791B2 (en) System for extracting, classifying, and enriching cyber criminal communication data
US20170006060A1 (en) Systems and methods for detecting man-in-the-middle attacks
US11303670B1 (en) Pre-filtering detection of an injected script on a webpage accessed by a computing device
CN112602084B (en) System and method for identifying data leakage
WO2024041436A1 (en) Service request processing method and apparatus, and electronic device and storage medium
US10375077B1 (en) Systems and methods for mediating information requests
US11997125B2 (en) Automated actions in a security platform
US10019582B1 (en) Detecting application leaks
US10193880B1 (en) Systems and methods for registering user accounts with multi-factor authentication schemes used by online services
CN111262842B (en) Webpage tamper-proofing method and device, electronic equipment and storage medium
CN111507734B (en) Method and device for identifying cheating request, electronic equipment and computer storage medium
US11816209B1 (en) Systems and methods for protecting data on devices
US20230101198A1 (en) Computer-implemented systems and methods for application identification and authentication
US20230094066A1 (en) Computer-implemented systems and methods for application identification and authentication
Hernandez et al. RacketStore: measurements of ASO deception in Google play via mobile and app usage
US20230344840A1 (en) Method, apparatus, system, and non-transitory computer readable medium for identifying and prioritizing network security events

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23856526

Country of ref document: EP

Kind code of ref document: A1